Critical Infrastructure Protection
Federal Efforts Require a More Coordinated and Comprehensive Approach for Protecting Information Systems
Gao ID: GAO-02-474 July 15, 2002
Critical infrastructure protection (CIP) involves activities that enhance the security of the nation's cyber and physical public and private infrastructures that are essential to national security, economic activity, and public health and safety. At least 50 federal organizations within 13 major departments and agencies mentioned in Presidential Decision Directive 63 are involved in CIP activities that include setting policy, analyzing vulnerabilities and intelligence information, disseminating alerts and warnings on potential and actual infrastructure attacks, developing remediation plans, responding to incidents, and performing research and development. Although most organizations could identify their relationships with other key CIP entities, relationships among all organizations performing similar activities were not consistently established. Most of the organizations in GAO's review do not receive appropriations specifically designated for cyber CIP and, therefore, do not track these funds. A complicating factor in tracking funds spent on cyber CIP activities is that organizational totals often include funds spent on physical, cyber, and agency-specific CIP spending.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-02-474, Critical Infrastructure Protection: Federal Efforts Require a More Coordinated and Comprehensive Approach for Protecting Information Systems
This is the accessible text file for GAO report number GAO-02-474
entitled 'Critical Infrastructure Protection: Federal Efforts Require a
More Coordinated and Comprehensive Approach for Protecting Information
Systems' which was released on July 15, 2002.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products‘ accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
Report to the Committee on Governmental Affairs, U.S. Senate:
July 2002:
Critical Infrastructure Protection:
Federal Efforts Require a More Coordinated and Comprehensive Approach
for Protecting Information Systems:
GAO-02-474:
Contents:
Letter:
Results in Brief:
Background:
At Least 50 Federal Organizations Derive Their Cyber CIP
Responsibilities from a Variety of Sources:
Relationships among Cyber CIP Organizations Are Not Consistently
Established:
CIP Funds Are Not Separately Appropriated for Most
Organizations, and Precise Levels of Spending Cannot Be Ascertained:
Conclusions:
Recommendation:
Agency Comments and Our Evaluation:
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Federal Organizations Involved in National or Multiagency
Cyber CIP Efforts:
Federal Advisory Committees:
Executive Office of the President:
Chief Information Officers Council:
National Communications System:
Federal Communications Commission:
U.S. Department of Commerce:
U.S. Department of Defense:
Director of Central Intelligence:
U.S. Department of Energy:
U.S. Department of Justice:
U.S. Department of Transportation:
Environmental Protection Agency:
Federal Emergency Management Agency:
U.S. General Services Administration:
Department of Health and Human Services:
National Science Foundation:
U.S. Department of State:
U.S. Department of the Treasury:
Appendix III: Components of Executive Departments or Agencies and
Their Primary Activities Related to Cyber CIP:
Appendix IV: Comments from the Department of Justice:
Appendix V: Comments from the Special Advisor to the President for
Cyberspace Security:
Appendix VI: Comments from the Office of Science and Technology Policy:
Appendix VII: Comments from the Federal Emergency Managament Agency:
Appendix VIII: Comments from the Department of State:
Appendix IX: GAO Contact and Staff Acknowledgements:
GAO Contact:
Acknowledgments:
Tables:
Table 1: Observed Threats to Critical Infrastructure:
Table 2: Key Executive Orders, Presidential Decision Directives, Acts,
and Directives That Mention Activities Related to Cyber CIP:
Table 3: Office of Homeland Security Fiscal Year 2002 and 2003 CIP
Funding:
Table 4: Executive Department or Agency Components and Their Primary
Activities Related to Cyber CIP:
Figures:
Figure 1: Information Security Incidents Reported to Carnegie-Mellon‘s
CERT®, Coordination Center: 1990-2001:
Figure 2: Organizations with CIP Responsibilities as Outlined by PDD 63:
Figure 3: Overview of National or Multiagency Federal Cyber CIP
Organizations:
Figure 4: Components of Executive Departments or Agencies and Their
Primary Activities Related to Cyber CIP (as indicated by the Color-
Coded Legend Below):
CIAO: Critical Infrastructure Assurance Office:
CIP: critical infrastructure protection:
DOD: Department of Defense:
ECIE: Executive Council on Integrity and Efficiency :
FBI: Federal Bureau of Investigation:
FedCIRC: Federal Computer Incident Response Center:
FEMA: Federal Emergency Management Agency:
GSA: General Services Administration:
ISAC: information sharing and analysis center:
NIAC: National Infrastructure Assurance Council:
NIPC: National Infrastructure Protection Center:
NIST: National Institute of Standards and Technology:
NSA: National Security Agency:
OMB: Office of Management and Budget:
OSTP: Office of Science and Technology Policy:
PCIE: President‘s Council on Integrity and Efficiency:
PDD: Presidential Decision Directive:
R&D: research and development:
TSA: Transportation Security Administration:
Letter:
July 15, 2002:
The Honorable Joseph I. Lieberman:
Chairman:
The Honorable Robert F. Bennett:
Committee on Governmental Affairs:
United States Senate:
Since the early 1990s, an explosion in computer interconnectivity, most
notably growth in the use of the Internet, has revolutionized the way
that our government, nation, and much of the world communicate and
conduct business. However, this widespread interconnectivity also poses
enormous risks to our computer systems and, more importantly, to the
critical operations and infrastructures they support, such as
telecommunications, power distribution, national defense, law
enforcement, and critical government services. Because potential
adversaries--be they nation-states, cyber terrorist groups, criminal
organizations, or disgruntled insiders--can develop cyber-attack
capabilities to attempt to exploit these risks, it is essential that
our critical infrastructures be adequately protected.
Concerns about computer-based vulnerabilities have been reported
repeatedly during the 1990s. Since 1997--most recently in January
2001--we, in reports to the Congress,[Footnote 1] have designated
information security a governmentwide high-risk area. In addition, in
its October 1997 report,[Footnote 2] the President‘s Commission on
Critical Infrastructure Protection described, from a national
perspective, the potentially devastating implications of poor
information security.
In May 1998, Presidential Decision Directive 63 was issued in response
to the commission‘s report. The directive called for a range of actions
intended to improve federal agency security programs, establish a
partnership between the government and the private sector, and improve
the nation‘s ability to detect and respond to serious computer-based
attacks. Critical infrastructure protection (CIP) involves activities
that enhance the security of our nation‘s cyber and physical public and
private infrastructures that are essential to national security,
national economic security, and/or national public health and safety.
On October 16, 2001, President Bush issued Executive Order 13231,
’Critical Infrastructure Protection in the Information Age,“ which
continues many Presidential Decision Directive 63 activities by
focusing on cyberthreats to critical infrastructures, and also created
the President‘s Critical Infrastructure Protection Board to coordinate
federal cybersecurity efforts.
In response to your request, we reviewed federal organizations involved
in national or multiagency cyber CIP activities. Specifically, our
objectives were to (1) identify the federal civilian, defense, and
intelligence organizations involved in protecting critical
infrastructures from computer-based attacks, and their
responsibilities, current organizational placement, and source of
authority; (2) identify the organizations‘ relationships with each
other; and (3) determine appropriated CIP funds for each organization.
As agreed with your staff, we concentrated on federal organizations
identified in Presidential Decision Directive 63 or Executive Order
13231 that have a national or multiagency cyber CIP focus and did not
address organizations involved solely in CIP activities specific to
their department or agency, such as the agencies‘ critical
infrastructure assurance offices. For example, although organizations
such as the Federal Aviation Administration, the Centers for Disease
Control, the Financial Management Service, and the National Weather
Service are responsible for the security of critical cyber systems,
they do not have national cyber CIP responsibilities outside their
agencies. In addition, other information security organizations that
receive federal funding were not included in our review. Further
details on our objectives, scope, and methodology are provided in
appendix I.
Results in Brief:
At least 50 federal organizations are involved in national or
multiagency cyber CIP activities that include setting policy, analyzing
vulnerabilities and intelligence information, disseminating alerts and
warnings on potential and actual infrastructure attacks, developing
remediation plans, responding to incidents, and performing research and
development. These organizations are primarily located within 13 major
departments and agencies mentioned in Presidential Decision Directive
63. In addition to most of these organizations‘ noting that Directive
63 and Executive Order 13231 were the primary sources dictating their
current cyber CIP roles and responsibilities, many identified other
preexisting laws, directives, and orders that levy related
requirements. Nevertheless, current cyber CIP efforts do not
specifically address all potentially relevant critical infrastructure
sectors or federal agencies. For example, Directive 63 excludes some
key infrastructure areas and their respective federal agencies, such as
those associated with chemical manufacturing and food safety. The chair
of the President‘s Critical Infrastructure Protection Board, as well as
officials from the Critical Infrastructure Assurance Office,
acknowledged that our nation‘s critical infrastructures are currently
being redefined and could be expanded in view of the events of
September 11, 2001. Such an effort is critical to ensuring that we are
comprehensively addressing our nation‘s critical infrastructures.
Although most organizations could identify their relationships with
other key cyber CIP entities, relationships among all organizations
performing similar activities (e.g., policy development or analysis and
warning) were not consistently established. The President‘s Critical
Infrastructure Protection Board is intended to coordinate federal
efforts and programs related to protecting critical infrastructures.
However, an underlying challenge in this coordination is that a
detailed strategy is still being developed. Without a strategy that
identifies responsibilities and relationships for all cyber CIP
efforts, our nation risks not knowing whether we have the appropriate
structure to deal with the growing threat of computer-based attacks on
its critical infrastructure. The President‘s Critical Infrastructure
Protection Board is currently developing a proposed national strategy
in coordination with the private sector. It is essential that this
strategy define the roles, responsibilities, and relationships among
the various federal organizations involved in cyber CIP activities.
Most of the organizations in our review do not receive appropriations
specifically designated for cyber CIP and, therefore, do not have a
process to track these funds. A complicating factor in tracking funds
spent on cyber CIP activities is that organizational totals often
include funds spent on physical, cyber, and agency-specific CIP
spending. A few selected organizations can readily identify their CIP
funding since the majority, and in some cases all, of their operations
are related to such activities. Overall, on the basis of agency input
submitted to the Office of Management and Budget (OMB), the executive
branch estimated that $3.9 billion was requested for CIP for fiscal
year 2003. However, this total involves both physical and cyber CIP,
and detailed breakdowns of these funds are not available. OMB plans to
provide a more detailed breakdown in the future.
We are recommending that when developing the strategy to guide federal
cyber CIP efforts, senior executive branch officials ensure that the
strategy, among other things, includes all relevant sectors, defines
the key federal agencies‘ roles and responsibilities associated with
each of these sectors, and defines the relationships among the key
cyber CIP organizations.
In providing written comments on a draft of this report, the Department
of Justice generally concurred with our findings and recommendations;
the Special Advisor to the President for Cyberspace Security and the
Department of State did not indicate whether they agreed or disagreed;
the Federal Emergency Management Agency requested that we add an
additional organization, and the Office of Science and Technology
Policy (OSTP) disagreed with our statement that none of the R&D
organizations coordinated with them. Specifically, on the basis of
additional information the Federal Emergency Management Agency provided
in an attachment, we added the Office of the Chief Information Officer
and Information Technology Services Directorate and also incorporated
additional technical comments, as appropriate. OSTP stated that it is
inaccurate for us to imply that consultations are not occurring with
the agencies with research and development (R&D); however, when we
asked the R&D organizations who they coordinate with, none indicated
that they coordinated with OSTP, nor did any of these organizations
comment on this statement in our draft report that OSTP took exception
to. We also received oral comments from nine agencies that have been
incorporated into the report, as appropriate. Although the written and
oral comments varied in scope and detail, they were primarily limited
to technical comments on the description of their responsibilities
described in appendix II. We have incorporated these changes in the
report as appropriate. The Department of Transportation had no
comments, and we did not receive comments from the Department of
Commerce.
Background:
The risks associated with our nation‘s reliance on interconnected
computer systems are substantial and varied. By launching attacks
across a span of communications systems and computers, attackers can
effectively disguise their identity, location, and intent, thereby
making them difficult and time-consuming to trace. Such attacks could
severely disrupt computer-supported operations, compromise the
confidentiality of sensitive information, and diminish the integrity of
critical data. A significant concern is that terrorists or hostile
foreign states could launch computer-based attacks on critical systems
to severely damage or disrupt national defense or other critical
operations or steal sensitive data, resulting in harm to the public
welfare. According to the National Security Agency (NSA), foreign
governments already have or are developing computer attack
capabilities, and potential adversaries are developing a body of
knowledge about U.S. systems and about methods to attack these systems.
The threat to these infrastructures was highlighted by the Special
Advisor to the President for Cyberspace Security in a Senate briefing
when he stated that although to date none of the traditional terrorists
groups such as al Qaeda have used the Internet to launch a known
assault on the U.S.‘s infrastructure, information on computerized water
systems was recently discovered on computers found in al Qaeda camps in
Afghanistan. Table 1 summarizes the key threats to our critical
infrastructures.
Table 1: Observed Threats to Critical Infrastructure:
Threat: Criminal groups;
Description: There is an increased use of cyber intrusions by criminal
groups who attack systems for purposes of monetary gain.
Threat: Foreign intelligence services;
Description: Foreign intelligence services use cyber tools as part of
their information gathering and espionage activities.
Threat: Hackers;
Description: Hackers sometimes crack into networks for the thrill of
the challenge or for bragging rights in the hacker community. While
hacking once required a fair amount of skill or computer knowledge,
hackers can now download attack scripts and protocols from the
Internet and launch them against victim sites. Thus, while attack
tools have become more sophisticated, they have also become easier to
use.
Threat: Hacktivists;
Description: Hacktivism refers to politically motivated attacks on
publicly accessible Web pages or e-mail servers. These groups and
individuals overload e-mail servers and hack into Web sites to send a
political message.
Threat: Information warfare;
Description: Several nations are aggressively working to develop
information warfare doctrine, programs, and capabilities. Such
capabilities enable a single entity to have a significant and serious
impact by disrupting the supply, communications, and economic
infrastructures that support military power--impacts that, according
to the Director of Central Intelligence,[A] can affect the daily lives
of Americans across the country.
Threat: Insider threat;
Description: The disgruntled organization insider is a principal
source of computer crimes. Insiders may not need a great deal of
knowledge about computer intrusions because their knowledge of a
victim system often allows them to gain unrestricted access to cause
damage to the system or to steal system data.
Threat: Virus writers;
Description: Virus writers are posing an increasingly serious threat.
Several destructive computer viruses and ’worms“ have harmed files and
hard drives, including the Melissa Macro, the CIH (Chernobyl), and
Nimda viruses and the Explore.Zip and CodeRed worms.
[A] Prepared Statement of George J. Tenet, director of central
intelligence, before the Senate Select Committee on Intelligence,
February 2, 2000.
Source: Federal Bureau of Investigation.
[End of table]
The number of reported cyber-based incidents is increasing. Complete
summary data are not available because many incidents are not reported.
Nevertheless, the number of reported incidents handled by the
Carnegie-Mellon University CERT®‚ Coordination Center[Footnote 3]
continues to increase dramatically. For example, the number of
incidents reported to the CERT®‚ Coordination Center during the first
quarter of 2002 is more than half the number of incidents reported for
all of 2001. Figure 1 shows the number of incidents reported to the
CERT®‚ Coordination Center from 1990 through 2001.
Figure 1: Information Security Incidents Reported to Carnegie-Mellon‘s
CERT‚ Coordination Center: 1990-2001:
[See PDF for image]
Source: Carnegie-Mellon‘s CERT‚ Coordination Center.
[End of figure]
The events of September 11, 2001, underscore the need to protect
America‘s critical infrastructures against potentially disastrous
cyberattacks--attacks that could also be coordinated to coincide with
physical terrorist attacks to maximize the impact of both.
Critical Infrastructure Protection Policy Has Been Evolving Since the
Mid-1990‘s:
Federal awareness of the importance of securing our nation‘s cyber
critical infrastructures, which underpin our society, economy, and
national security, has been evolving since the mid-1990‘s. Over the
years, a variety of working groups have been formed, special reports
written, federal policies issued, and organizations created to address
the issues that have been raised. In June 1995, a Critical
Infrastructure Working Group, led by the Attorney General, was formed
to (1) identify critical infrastructures and assess the scope and
nature of threats to them, (2) survey existing government mechanisms
for addressing these threats, and (3) propose options for a full-time
group to consider long-term government response to threats to critical
infrastructures. The working group recommended creating a commission to
further investigate the issues. In response to this recommendation, the
President‘s Commission on Critical Infrastructure Protection was
established in July 1996 to study the nation‘s vulnerabilities to both
cyber and physical threats.
In October 1997, the President‘s Commission issued its report, which
described the potentially devastating implications of poor information
security from a national perspective. The report recommended several
measures to achieve a higher level of critical infrastructure
protection, including infrastructure protection through industry
cooperation and information sharing, a national organization structure,
a revised program of research and development, a broad program of
awareness and education, and reconsideration of laws related to
infrastructure protection. The report stated that a comprehensive
effort would need to ’include a system of surveillance, assessment,
early warning, and response mechanisms to mitigate the potential for
cyberthreats.“ It said that the Federal Bureau of Investigation (FBI)
had already begun to develop warning and threat analysis capabilities
and urged it to continue in these efforts. In addition, the report
noted that the FBI could serve as the preliminary national warning
center for infrastructure attacks and provide law enforcement,
intelligence, and other information needed to ensure the highest
quality analysis possible.
The President subsequently issued Presidential Decision Directive (PDD)
63, in 1998, which describes a strategy for cooperative efforts by
government and the private sector to protect critical, computer-
dependent operations. PDD 63 called for a range of actions intended to
improve federal agency security programs, improve the nation‘s ability
to detect and respond to serious computer-based attacks, and establish
a partnership between the government and the private sector. The
directive called on the federal government to serve as a model of how
infrastructure assurance is best achieved and designated lead agencies
to work with private-sector and government organizations. Further, it
established critical infrastructure protection as a national goal, and
stated that, by the close of 2000, the United States was to have
achieved an initial operating capability to protect the nation‘s
critical infrastructures from intentional destructive acts and, no
later than 2003, an enhanced capability.
To accomplish its goals, PDD 63 designated and established
organizations to provide central coordination and support, including:
* the Critical Infrastructure Assurance Office (CIAO), an interagency
office housed in the Department of Commerce, which was established to
develop a national plan for CIP on the basis of infrastructure plans
developed by the private sector and federal agencies;
* the National Infrastructure Protection Center (NIPC), an organization
within the FBI, which was expanded to address national-level threat
assessment, warning, vulnerability, and law enforcement investigation
and response; and:
* the National Infrastructure Assurance Council (NIAC), which was
established to enhance the partnership of the public and private
sectors in protecting our critical infrastructures.[Footnote 4]
To ensure coverage of critical sectors, PDD 63 also identified eight
private-sector infrastructures and five special functions. The
infrastructures are (1) information and communications; (2) banking and
finance; (3) water supply; (4) aviation, highway, mass transit,
pipelines, rail, and waterborne commerce; (5) emergency law
enforcement; (6) emergency fire services and continuity of government;
(7) electric power and oil and gas production and storage; and (8)
public health services. The special functions are (1) law enforcement
and internal security, (2) intelligence, (3) foreign affairs, (4)
national defense, and (5) research and development. For each of the
infrastuctures and functions, the directive designated lead federal
agencies to work with their counterparts in the private-sector. For
example, the Department of the Treasury is responsible for working with
the banking and finance sector, and the Department of Energy is
responsible for working with the electrical power industry. Similarly,
regarding special function areas, the Department of Defense (DOD) is
responsible for national defense, and the Department of State is
responsible for foreign affairs.
To facilitate private-sector participation, PDD 63 also encouraged the
creation of information sharing and analysis centers (ISAC) that could
serve as mechanisms for gathering, analyzing, and appropriately
sanitizing and disseminating information to and from infrastructure
sectors and the federal government through the NIPC. In September 2001,
we reported that six ISACs within five infrastructures had been
established to gather and share information about vulnerabilities,
attempted intrusions, and attacks within their respective
infrastructures and to meet specific sector objectives.[Footnote 5]
Three of the ISACs--for the telecommunications and electric power
industries and emergency fire services segment--were based on groups
that had existed previously. The other three--for the financial
services, information technology, and emergency law enforcement
sectors--had been established since October 1999. In addition, at that
time, we reported that the formation of at least three more ISACs for
various infrastructure sectors were being discussed. Figure 2 displays
a high-level overview of the organizations with CIP responsibilities as
outlined by PDD 63.
Figure 2: Organizations with CIP Responsibilities as Outlined by PDD 63:
[See PDF for image]
Note: In February 2001, the Critical Infrastructure Coordination Group
was replaced with the Information Infrastructure Protection and
Assurance Group under the Policy Coordinating Committee on Counter-
terrorism and National Preparedness. In October 2001, the National
Infrastructure Assurance Council was replaced with the National
Infrastructure Advisory Council, and cyber CIP functions performed by
the national coordinator were assigned to the chair of the President‘s
Critical Infrastructure Protection Board.
Source: CIAO.
[End of figure]
In response to PDD 63, in January 2000 the White House issued its
’National Plan for Information Systems Protection.“[Footnote 6] The
national plan provided a vision and framework for the federal
government to prevent, detect, respond to, and protect the nation‘s
critical cyber-based infrastructure from attack and reduce existing
vulnerabilities by complementing and focusing existing federal computer
security and information technology requirements. Subsequent versions
of the plan were expected to (1) define the roles of industry and state
and local governments working in partnership with the federal
government to protect privately owned physical and cyber-based
infrastructures from deliberate attack and (2) examine the
international aspects of CIP.
The most recent federal cyber CIP guidance was issued in October 2001,
when President Bush signed Executive Order 13231, establishing the
President‘s Critical Infrastructure Protection Board to coordinate
cyber-related federal efforts and programs associated with protecting
our nation‘s critical infrastructures. The Special Advisor to the
President for Cyberspace Security chairs the board. Executive Order
13231 tasks the board with recommending policies and coordinating
programs for protecting CIP-related information systems. The executive
order also established 10 standing committees to support the board‘s
work on a wide range of critical information infrastructure efforts.
The board is intended to coordinate with the Office of Homeland
Security in activities relating to the protection of and recovery from
attacks against information systems for critical infrastructure,
including emergency preparedness communications that were assigned to
the Office of Homeland Security by Executive Order 13228, dated October
8, 2001. The board recommends policies and coordinates programs for
protecting information systems for critical infrastructure, including
emergency preparedness communications, and the physical assets that
support such systems. In addition, the chair coordinates with the
Assistant to the President for Economic Policy on issues relating to
private-sector systems and economic effects and with the Director of
OMB on issues relating to budgets and the security of federal computer
systems.
Effective Federal Information Security Programs Are Critical to CIP:
At the federal level, cyber CIP activities are a component, perhaps the
most critical, of a federal department or agency‘s overall information
security program. Since September 1996, we have reported that poor
information security is a widespread federal government problem with
potentially devastating consequences.[Footnote 7] These information
security programs include efforts to protect critical cyber assets
owned by the federal government. Although agencies have taken steps to
redesign and strengthen their information system security programs, our
analyses of information security at major federal agencies have shown
that federal systems were not being adequately protected from computer-
based threats, even though these systems process, store, and transmit
enormous amounts of sensitive data and are indispensable to many
federal agency operations. In addition, in 1998, 2000, and 2002, we
analyzed audit results for 24 of the largest federal agencies and found
that all 24 had significant information security weaknesses.[Footnote
8] As a result of these analyses, we have identified information
security as a governmentwide high-risk issue in reports to the Congress
since 1997--most recently in January 2001.[Footnote 9]
In March of this year, when we testified on the efforts by the federal
government to implement provisions for Government Information Security
Reform Act that were enacted as part of the National Defense
Authorization Act for Fiscal Year 2001,[Footnote 10] we highlighted the
fact that each agencywide information security program is required to
ensure the integrity, confidentiality, and availability of systems and
data supporting the agency‘s critical operations and assets (e.g., CIP
assets).[Footnote 11] At that time, of 24 of the largest agencies, 15
had not implemented an effective methodology to identify their critical
assets,[Footnote 12] and 7 had not determined the priority for
restoring these assets should a disruption in critical operations
occur. OMB indicated that it was to direct all agencies to identify and
prioritize their critical assets.
Our testimony was consistent with what the President‘s Council on
Integrity and Efficiency and the Executive Council on Integrity and
Efficiency (PCIE/ECIE) reported last year on the federal government‘s
compliance with PDD 63. It concluded that the federal government could
improve its planning and assessment activities for cyber-based critical
infrastructures. Specifically, the council stated that (1) many agency
infrastructure plans were incomplete; (2) most agencies had not
identified their mission-critical infrastructure assets; and (3) few
agencies had completed vulnerability assessments of mission-critical
assets or developed remediation plans.
At Least 50 Federal Organizations Derive Their Cyber CIP
Responsibilities from a Variety of Sources:
At least 50 organizations are involved in national or multiagency cyber
CIP efforts and derive their responsibilities from PDD 63 and Executive
Order 13231, as well as various other federal laws, directives, and
orders. These organizations are involved in many cyber CIP activities,
including policy development, vulnerability assessment, and research
and development. However, current cyber CIP efforts do not specifically
address all potentially relevant sectors and their respective federal
agencies. The chair of the President‘s Critical Infrastructure
Protection Board, as well as officials from the CIAO, acknowledged that
our nation‘s critical infrastructures are currently being reexamined
and could be expanded.
Many Organizations Have National or Multiagency Cyber CIP
Responsibility:
Protecting the nation‘s critical infrastructure against information
attacks is a complicated process involving many organizations within
many government agencies. At least 50 organizations are involved in
national or multiagency cyber CIP efforts. These entities include 5
advisory committees; 6 Executive Office of the President organizations;
38 executive branch organizations associated with departments,
agencies, or intelligence organizations; and 3 other organizations.
These organizations are primarily located within 13 major departments
and agencies mentioned in PDD 63.[Footnote 13] Several departments,
including DOD, Treasury, and Commerce have multiple organizations
involved in cyber CIP activities. For example, we identified 7
organizations within DOD involved in national or multiagency cyber CIP
efforts. Appendix II identifies each of the organizations, provides a
high-level description of their cyber CIP responsibilities, and
identifies their source(s) of authority.
Although each organization described a wide range of cyber CIP-related
activities, collectively they described activities related to the
following five categories:
* policy development, including advising on policy issues, coordinating
and planning CIP activities, issuing standards and best practices,
providing input to the national CIP plan, developing education and
outreach programs with governmental and private sector organizations,
and coordinating internationally;
* analysis and warning, including conducting vulnerability analyses,
gathering intelligence information, coordinating and directing
activities to detect computer-based attacks, disseminating information
to alert organizations of potential and actual infrastructure attacks,
and facilitating the sharing of security-related information;
* compliance, including overseeing implementation of cyber CIP
programs, ensuring that policy is adhered to and remedial plans are
developed, and investigating cyberattacks on critical infrastructures;
* response and recovery, including reconstituting minimum required
capabilities, isolating and minimizing damage, and coordinating the
necessary actions to restore functionality; and:
* research and development, including coordinating federally sponsored
research and development in support of infrastructure protection.
On the following page, figure 3 displays a high-level overview of the
organizational placement of the 5 advisory committees; 6 Executive
Office of the President organizations; 13 executive branch departments
and agencies; and several other organizations involved in national or
multiagency cyber CIP efforts. For departments and agencies, figure 4
provides further detail on component organizations‘ involvement, but
does not illustrate the internal relationships within each agency. For
all figures, organizations‘ cyber CIP-related activities are identified
in one or more of the five general categories discussed above. Appendix
III displays in tabular format the entities and their activities.
[Footnote 14]
Figure 3: Overview of National or Multiagency Federal Cyber CIP
Organizations:
[See PDF for image]
Note: Major agencies or departments are highlighted in yellow here and
in figure 4. The organizations are color-coded to correspond to one or
more of the five general activities related to cyber CIP (see legend).
[End of figure]
Figure 4: Components of Executive Departments or Agencies and Their
Primary Activities Related to Cyber CIP (as indicated by the Color-
Coded Legend Below):
[See PDF for image]
[End of figure]
The President‘s recent proposal to create a cabinet-level Department of
Homeland Security states that ’currently, at least twelve different
government entities oversee the protection of our critical
infrastructure.“ As our analysis shows, at least 50 organizations are
involved in national cyber CIP efforts.
Federal Organizations Derive Their Cyber CIP Responsibilities from a
Variety of Laws, Regulations, and Federal Policy Documents:
In addition to PDD 63 and Executive Order 13231, agencies derive and
justify their cyber CIP efforts from a variety of laws, regulations,
and federal policy documents. Various laws and regulations also address
the need to secure federal systems, including the Government
Information Security Reform Act; the Clinger-Cohen Act; the Computer
Security Act; and Appendix III to OMB Circular A-130, Security of
Federal Automated Information Resources. In addition to the overarching
legislation mentioned above, table 2 below summarizes the key executive
orders, presidential decision directives, and other acts and directives
that mention activities related to cyber CIP.
Table 2: Key Executive Orders, Presidential Decision Directives, Acts,
and Directives That Mention Activities Related to Cyber CIP:
Executive orders:
Law or regulation: Executive Order 12472, ’Assignment of National
Security and Emergency Preparedness Telecommunications Functions“;
Description: Executive orders: Signed in 1984, this order established
the National Communication Systems and assigns national security
emergency preparedness responsibilities for telecommunications.
Law or regulation: Executive Order 12656, ’Assignment of Emergency
Preparedness Responsibilities“;
Description: Executive orders: Signed in 1988, this order assigns
federal national security emergency preparedness responsibilities to
federal departments and agencies for various sectors.
Law or regulation: Executive Order 13231, ’Critical Infrastructure
Protection in the Information Age“;
Description: Executive orders: Signed in October 2001, this order
establishes the President‘s Critical Infrastructure Protection Board
to coordinate the federal efforts and programs associated with
protecting our nation‘s critical infrastructures. A special advisor to
the President for cyberspace security chairs the board. This order
also tasks the board to recommend policies and coordinate programs for
protecting information systems for critical infrastructure protection.
The executive order also established 10 standing committees to support
the board‘s work on a wide range of critical information
infrastructure efforts.
Law or regulation: Executive Order 13228, ’Establishing the Office of
Homeland Security and the Homeland Security Council“;
Description: Executive orders: Signed in October 2001, this order
establishes the Office of Homeland Security, whose mission is to
develop and coordinate the implementation of a comprehensive national
strategy to secure the United States from terrorist threats or
attacks. The office will coordinate the executive branch‘s efforts to
detect, prepare for, prevent, protect against, respond to, and recover
from terrorist attacks within the United States.
Presidential decision directives:
Law or regulation: PDD 39, ’Presidential Decision Directive on
Terrorism“;
Description: Executive orders: Signed in 1995, this directive sets
forth the U.S. general policy to use all appropriate means to deter,
defeat, and respond to all terrorist attacks against U.S. interests.
More specifically, PDD 39 directs federal departments to take various
measures to (1) reduce the vulnerabilities to terrorism, (2) deter and
respond to terrorism, and (3) develop effective capabilities to
prevent and manage the consequences of terrorist use of weapons of
mass destruction. The directive charges the FBI as the lead
investigative agency to reduce U.S. vulnerabilities to terrorism.
Law or regulation: PDD 62 ’Combating Terrorism“;
Description: Executive orders: Signed in 1998, this directive
established the Office of the National Coordinator for Security,
Infrastructure Protection and Counter-Terrorism. PDD 62 also
reinforces the mission of many of the agencies charged with roles in
defending terrorism by codifying and clarifying their activities in
the range of counter-terrorism programs including the protection of
the computer-based systems that support critical infrastructure sectors.
Law or regulation: PDD 63, ’Protecting America‘s Critical
Infrastructures“;
Description: Executive orders: Signed in 1998, this directive expanded
the NIPC at the FBI, and established ISACs in cooperation with the
federal government, private sector, and the CIAO to support work in
developing a national plan.
Law or regulation: PDD 67, ’Enduring Constitutional Government and
Continuity of Government Operations“;
Description: Executive orders: Signed in 1998, this directive required
federal agencies to develop continuity of operations plans for
essential operations.
Law or regulation: PDD 75, ’U.S. Counterintelligence Effectiveness -
Counterintelligence for the 21st Century“;
Description: Executive orders: Signed in 2001, this directive
establishes a counterintelligence board of directors, the National
Security Council Deputies Committee, and a National
Counterintelligence Executive.
Other directive/acts:
Law or regulation: National Security Directive 42, National Policy for
the Security of National Security Systems;
Description: Executive orders: Signed in 1990, this directive
designates the Director, NSA the national manager for national
security telecommunications and information systems security and calls
upon him or her to promote and coordinate defense efforts against
threats to national security systems.
Law or regulation: The Stafford Act;
Description: Executive orders: Enacted in 1974, this act enables the
Federal Emergency Management Agency (FEMA) to provide supplementary
federal assistance to individuals, state and local governments, and
certain private nonprofit organizations to assist them in recovering
from the devastating effects of major disasters.
Law or regulation: The USA PATRIOT Act;
Description: Executive orders: Enacted in 2001, this act enables law
enforcement entities to apply modern surveillance capabilities to new
technologies, such as the Internet, and execute these devices in
multiple jurisdictions anywhere in the United States.
Law or regulation: The Aviation and Transportation Security Act;
Description: Executive orders: Enacted in 2001, this act created the
Transportation Security Administration (TSA) in the Department of
Transportation. The act gives TSA direct responsibility for aviation
and all other transportation security.
[End of table]
As demonstrated by the type and number of sources cited, many cyber CIP
activities are related to, and overlap with, other aspects of agencies‘
national security efforts, including homeland security, information
security, national security emergency preparedness telecommunications,
and continuity of government operations.
Additional Federal Organizations Have CIP-related Responsibilities:
Current cyber CIP efforts do not specifically address all potentially
relevant critical infrastructure sectors or federal agencies. As
mentioned previously, PDD 63 identifies eight sector infrastructures
with 13 lead agencies associated with the eight sectors and five
special functions. However, PDD 63 and Executive Order 13231 does not
specifically address other possible critical sectors such as food
supply, chemical manufacturing, and delivery services and their
respective federal agency counterparts.
Although important agencies and sectors may not be officially addressed
in PDD 63 or Executive Order 13231, a few organizations have stepped
forward to address these gaps. For example, the Department of
Agriculture, with responsibilities for food safety, recently
established a Homeland Security Council, a departmentwide council with
the mission of protecting the food supply and agricultural production.
Also, a food ISAC has been recently formed by the Food Marketing
Institute in conjunction with NIPC. In addition, officials from the
designated private-industry sectors for both electricity and water have
identified the need to coordinate with the Department of the Interior.
These sectors have an interest in the physical and cyber safeguards for
dams under Interior‘s control, because of the water and electrical
power they produce. Officials from both sectors noted that this
coordination with Interior was just initiated at the beginning of 2002.
Administration officials acknowledge that PDD 63 and Executive Order
13231 are under review for the possible inclusion of additional
sectors. The chair of the President‘s Critical Infrastructure
Protection Board told a Senate subcommittee that the critical
infrastructure sectors were being reviewed after the September 11
attacks and the subsequent anthrax attacks on the U.S. Capitol.
According to the special advisor, industries such as chemical
processing, pharmaceuticals, and colleges and universities need to be
reevaluated as critical infrastructures. Additionally, officials at the
CIAO noted that the concept of critical infrastructures is being
reviewed as part of the development of a national strategy, and that
additional government functions are being considered for inclusion.
In addition, the proposal to create a Department of Homeland Security
also refers to the need to consider additional sectors. According to
the proposal, ’the Department would be responsible for comprehensively
evaluating the vulnerabilities of America‘s critical infrastructure,
including food and water systems, agriculture, health systems and
emergency services, information and telecommunications, banking and
finance, energy (electrical, nuclear, gas and oil, dams),
transportation (air, road, rail, ports, waterways), the chemical and
defense industries, postal and shipping entities, and national
monuments and icons.“ This proposal is referring to both cyber and
physical aspects of our national infrastructure.
Until all relevant infrastructure sectors and lead agencies are
clarified, our existing policies for, and possibly our nation‘s
approach to, cyber CIP remain incomplete. The opportunity for ensuring
that all relevant organizations are addressed exists in the development
of the new national strategy.
Relationships among Cyber CIP Organizations Are Not Consistently
Established:
Most organizations were able to identify their relationships and
coordination activities. This information is presented in appendix II
for each organization that could provide it.
However, in reviewing the reported coordination of organizations with
key lead entities identified under PDD 63 and Executive Order 13231, we
identified that relationships among all organizations performing
similar activities (e.g., policy development, analysis and warning)
were not consistently established. For example, under PDD 63, the CIAO
was set up to integrate the national CIP plan, coordinate a national
education and awareness program, and coordinate legislative affairs.
Nevertheless, of the organizations conducting policy development
activities, only about one-half reported that they coordinated with the
CIAO. Of the organizations with research and development functions,
none mentioned the OSTP, which was designated the lead coordinator for
research and development in both PDD 63 and Executive Order 13231.
Our prior work on the FBI‘s NIPC, the lead for analysis and warning, is
consistent with these examples. Specifically, in April 2001, we
reported that NIPC‘s role had not been clearly articulated and was not
being consistently interpreted.[Footnote 15] PDD 63 describes general
goals and provides an outline of the responsibilities assigned to the
NIPC. However, discussions with officials in the defense, intelligence,
and civilian agencies involved in CIP, and with OMB and the National
Security Council, showed that their views of NIPC‘s roles and
responsibilities differed from one another and, in some cases, from
those outlined in PDD 63. Several expressed an opinion that this lack
of consensus had hindered NIPC‘s progress and diminished support from
other federal agencies.
In recognition of the inconsistent coordination among organizations
involved in cyber CIP, President Bush issued Executive Order 13231,
’Critical Infrastructure Protection in the Information Age,“ which
acknowledged the need for additional coordination by creating the
President‘s Critical Infrastructure Protection Board to coordinate
federal efforts and programs related to the protection of critical
infrastructures. Among the board‘s activities stated in the order are
(1) outreach to the private sector and state and local governments; (2)
information sharing; (3) incident coordination and crisis response; (4)
recruitment, retention, and training of executive branch security
professionals; (5) research and development; (6) law enforcement
coordination with national security components; (7) international
information infrastructure protection; (8) legislation; and (9)
coordination with the Office of Homeland Security. The order
established 10 standing committees to support the board‘s work,
including committees on incident response coordination and research and
development. According to the Office of Homeland Security, the mission
of these committees, within the larger mission of the board, is to
coordinate programs across government in order to minimize duplication
of efforts, create synergies, and maximize resources.
More recently, the Assistant to the President for Homeland Security, in
an April 10, 2002, letter to the chairman of the Senate Governmental
Affairs Committee, to address a March request from the committee
seeking information on homeland security efforts, discussed the need
for increased coordination among several key national cyber CIP
organizations. The assistant stated that plans for developing a
cybersecurity information coordination center are under consideration
and that it would be possible for the President‘s Critical
Infrastructure Protection Board, the outreach and awareness component
of the NIPC, and the CIAO to be collocated there to better coordinate
each organization‘s duties and responsibilities related to outreach to
private industry.
National Strategy to Ensure Coordination Is Being Developed:
A missing requirement for implementing the President‘s Critical
Infrastructure Protection Board and improving coordination continues to
be the lack of a national strategy that defines organizational roles
and relationships. We have been recommending such a strategy for
several years, having first identified the need for a detailed plan in
1998. At that time, we reported that developing a governmentwide
strategy that clearly defined and coordinated the roles and new and
existing federal entities was important to ensure governmentwide
cooperation and support for PDD 63.[Footnote 16] At that time, we
recommended that OMB ensure such coordination.
As mentioned previously, in January 2000, the White House issued its
’National Plan for Information Systems Protection“ as a first major
element of a more comprehensive strategy to be developed. At that time,
we reiterated the importance of defining and clarifying organizational
roles and responsibilities, noting that numerous federal organizations
were collecting, analyzing, and disseminating data or guidance on
computer security vulnerabilities and incidents and that clarification
would help ensure a common understanding of (1) how the activities of
these many organizations interrelate, (2) who should be held
accountable for their success or failure, and (3) whether such
activities will effectively and efficiently support national goals.
[Footnote 17]
In September 2001, we continued to report that an underlying deficiency
in the implementation of PDD 63 has been the lack of an adequate
national strategy that delineates interim objectives and the specific
roles and responsibilities of federal and nonfederal organizations
involved in CIP.[Footnote 18] At that time, among other
recommendations, we recommended that the Assistant to the President for
National Security Affairs ensure that the federal government‘s strategy
to address computer-based threats defines specific roles and
responsibilities of organizations involved in CIP and related
information security activities. In commenting on a draft of the
report, Commerce noted that the administration is reviewing the
organizational structures for CIP to ensure coordination of federal
government efforts and that it is developing a new national plan.
The national strategy for cyber CIP is still being developed and is now
planned to be issued in September 2002. A key contributor to the
national strategy will be input from the Partnership for Critical
Infrastructure Security, an organization that grew out of PDD 63,
consisting of over 60 private-sector companies and associations and 13
federal government agencies. Also contributing to the national plan
will be responses to 53 questions categorized into five critical areas
of home user and small business, major enterprises, sectors of the
national information infrastructure, national-level institutions and
policies, and global issues. The questions deal with key computer
information issues, including awareness, best practices and standards,
accountability, funding, personnel, information sharing, warning,
analysis, and incident response and recovery. The President‘s Critical
Infrastructure Protection Board recently distributed the questions over
the Internet.
A clearly defined strategy is essential for defining the relationships
among the various cyber CIP organizations, integrating cyber CIP
activities with existing laws, and ensuring that our national approach
to cyber CIP is both coordinated and comprehensive. Without such a
detailed strategy, our nation risks not having the appropriate
structure to deal with the growing threat of computer-based attacks on
its critical infrastructure.
CIP Funds Are Not Separately Appropriated for Most Organizations, and
Precise Levels of Spending Cannot Be Ascertained:
Most of the organizations in our review do not receive appropriations
specifically designated for cyber CIP and, therefore, do not have a
process to track these funds. A complicating factor in tracking funds
spent on cyber CIP activities is that organizational totals often
include funds spent on physical, cyber, and agency-specific CIP
activities. Although most organizations cannot readily identify their
cyber CIP funding, a few key organizations can since most, or in some
cases all, of their operations are related to cyber CIP activities.
These organizations include the CIAO, NIPC, the National Institute of
Standards and Technology (NIST), and GSA‘s Federal Computer Incident
Response Center (FedCIRC), as highlighted in the February 2002 Office
of Homeland Security overview.[Footnote 19] Table 3 shows the CIP
funding identified in the homeland security budget for these four
national cyber CIP organizations.
Table 3: Office of Homeland Security Fiscal Year 2002 and 2003 CIP
Funding:
National CIP Entity: FedCIRC (GSA);
Fiscal year 2002 base: $10 million;
Emergency supplemental[A]: 0;
Fiscal year 2003 proposed: $11 million.
National CIP Entity: NIPC (FBI);
Fiscal year 2002 base: $72 million;
Emergency supplemental[A]: $61 million;
Fiscal year 2003 proposed: $125 million.
National CIP Entity: Computer Security Division (NIST);
Fiscal year 2002 base: $11 million;
Emergency supplemental[A]: 0;
Fiscal year 2003 proposed: $15 million.
National CIP Entity: CIAO (Commerce);
Fiscal year 2002 base: $5 million;
Emergency supplemental[A]: $1 million;
Fiscal year 2003 proposed: $7 million.
[A] P.L. 107-38, the Emergency Supplemental Appropriations Act for
Recovery from and Response to Terrorist Attacks on the United States:
FY 2001.
Source: Office of Homeland Security, Securing the Homeland,
Strengthening the Nation, February 2002.
[End of table]
Although most organizations are not appropriated CIP funds, OMB has
estimated CIP funding levels by department and independent agencies in
its Annual Report to Congress on Combating Terrorism.[Footnote 20]
According to OMB‘s report, CIP funds have increased from approximately
$1.2 billion in fiscal year 1998 (actual) to approximately $3.9 billion
in the President‘s fiscal year 2003 budget request.
Since September 11, additional funds have been provided or requested
for CIP activities related to homeland security, which has further
complicated identifying what aspects of CIP activities are funded. In a
recent report to the Congress, the Congressional Research Service
stated that the fiscal year 2002 estimates are not readily visible in
agency budgets or congressional appropriations.[Footnote 21] The
Congressional Research Service added that a detailed breakdown of CIP
funds is not available. Without a precise tracking of cyber CIP funding
and spending, it is difficult to determine if the federal government is
spending its limited cyber CIP resources on the appropriate priorities.
However, OMB officials told us that they plan to provide more detailed
breakdowns in the future. Such information is also necessary to enable
the CIP Board to make recommendations to OMB on cyber CIP funding, as
outlined in Executive Order 13231.
Conclusions:
Protecting our nation‘s critical infrastructure is vital to our
national security, economic stability, and public health and safety.
PDD 63 established a strong foundation that defined a starting point,
and Executive Order 13231 expanded that foundation by tasking a special
advisor to the President for cyberspace security to take a leadership
role in enhancing our future efforts in that area. The President‘s
recent proposal to create a Department of Homeland Security states that
’currently, at least twelve different government entities oversee the
protection of our critical infrastructure.“ However, as our analysis
shows, at least 50 organizations are involved in national or
multiagency cyber CIP efforts, as well as additional infrastructure
organizations that have not yet been officially recognized.
Further, although most organizations could identify their relationships
with other key cyber CIP entities, relationships among all
organizations performing similar activities (e.g., policy development
or analysis and warning) were not consistently established. Without a
strategy that identifies responsibilities and relationships for all
cyber CIP efforts, our nation risks not having the appropriate
structure to deal with the growing threat of computer-based attacks on
its critical infrastructures.
Finally, most of the organizations in our review do not receive
appropriations specifically designated for cyber CIP and, therefore, do
not have a process to track these funds. OMB plans to provide more
detailed information on this area in the future.
Recommendation:
We have previously recommended that the Assistant to the President for
National Security Affairs ensure that the federal government‘s CIP
strategy defines the specific roles and responsibilities of
organizations involved in CIP and related information security
activities. To supplement this recommendation, we recommend that when
developing the strategy to guide federal CIP efforts, the Assistant to
the President for National Security Affairs, the Assistant to the
President for Homeland Security, and the Special Advisor to the
President for Cyberspace Security ensure that, among other things, the
strategy:
* includes all relevant sectors and defines the key federal agencies‘
roles and responsibilities associated with each of these sectors, and:
* defines the relationships among the key CIP organizations.
Agency Comments and Our Evaluation:
We received written comments on a draft of this report from the Special
Advisor to the President for Cyberspace Security; the Chief of Staff
and General Counsel, Office of Science and Technology Policy (OSTP);
the Chief Operating Officer and General Counsel, Federal Emergency
Management Agency (FEMA); the Assistant Secretary and Chief Financial
Officer, Department of State; and the Director, Audit Liaison Office,
Justice Management Division, Department of Justice. The Department of
Justice generally concurred with our findings and recommendations (see
appendix IV for Justice‘s written comments); the Special Advisor to the
President for Cyberspace Security and the Department of State did not
indicate whether they agreed or disagreed; FEMA requested that we add
an additional organization, and OSTP disagreed with our statement that
none of the R&D organizations coordinated with them. We received oral
comments from officials from the Office of Management and Budget; the
Environmental Protection Agency; the Departments of Defense, Energy,
Health and Human Services, and Treasury; the Federal Communications
Commission; the National Science Foundation; and the General Services
Administration. Although the written and oral comments varied in scope
and detail, they were primarily limited to technical comments on the
description of their responsibilities described in appendix II. We have
incorporated these changes in the report, as appropriate. These changes
included the addition of a few organizations involved in national or
multiagency cyber CIP efforts. The Department of Transportation had no
comments on a draft of this report, and we did not receive comments
from the Department of Commerce.
In written comments on a draft of this report (see app. V), the Special
Advisor to the President for Cyberspace Security acknowledged the
complexity and importance of coordinating CIP efforts and stated that
the President‘s Critical Infrastructure Protection Board, created under
Executive Order 13231 and composed of senior federal officials,
coordinates cybersecurity efforts, including aligning roles and
responsibilities. The Special Advisor also pointed out that the
coordination of federal efforts is only a small part of the overall
infrastructure protection challenge since the majority of the U.S.
computing power is not owned by the federal government. He added that
he is currently coordinating a national strategy that will address
cybersecurity challenges faced by federal, state, and local
governments; private companies; infrastructure owners; and home users.
We agree that federal coordination is only part of the overall
challenge in effectively managing our nation‘s cyber CIP efforts and
look forward to the completion of the national strategy so that all
relevant sectors are included and relationships among the government‘s
many players are defined. The Special Advisor also made separate
technical comments, which have been incorporated in the report, as
appropriate.
In written comments on a draft of this report (see app. VI), OSTP
stated that it is inaccurate for us to ’imply that consultations are
not occurring with the agencies“ with R&D responsibilities and that it
has exercised its coordination authority for CIP R&D over the past 5
years through regular senior-level interagency meetings. However, when
we asked the R&D organizations who they coordinated with, none
indicated that they coordinated with OSTP, and OSTP did not
specifically identify the R&D organizations in our review. Also, none
of these organizations commented on this statement in our draft report
that OSTP took exception to. Therefore, we did not make any changes to
the report. In addition, OSTP also made separate technical comments
that have been incorporated in the report, as appropriate.
In written comments on a draft of this report (see app. VII), FEMA
stated that the current draft does not include the Office of the Chief
Information Officer/Information Technology Services Directorate. On
the basis of additional information the agency provided in an
attachment, we added this office and also incorporated additional
technical comments, as appropriate.
In written comments on a draft of this report (see app. VIII), the
Department of State did not indicate whether it agreed or disagreed
with our draft, but noted that we had not included one of its six
organizations, the Bureau of Information Resource Management. We did
not include this bureau because it is not involved in national or
multiagency cyber CIP efforts. As a result, we made no revisions to our
report.
We are sending copies of this report to other interested congressional
committees; the Assistant to the President for National Security
Affairs; the Assistant to the President for Homeland Security; the
Special Advisor to the President for Cyberspace Security; the Director
of the Office of Management and Budget; and the heads of the agencies
that are identified in this report. We will also make copies available
to others upon request. The report will be available at no charge on
the GAO Web site at [hyperlink, http://www.gao.gov].
If you or your offices have any questions about matters discussed in
this report, please contact me at (202) 512-3317 or Dave Powner,
assistant director, at (303) 572-7316. We can also be reached by e-mail
at daceyr@gao.gov or pownerd@gao.gov, respectively. Staff who made key
contributors to this report are listed in appendix IX.
Robert F. Dacey
Director, Information Security Issues:
Signed by Robert F. Dacey:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
The objectives of our review were to (1) identify the federal civilian,
defense, and intelligence organizations involved in protecting critical
infrastructures from computer-based attacks, and their
responsibilities, current organizational placement, and source of
authority; (2) determine the organizations‘ relationships with each
other; and (3) determine appropriated critical infrastructure
protection (CIP) funds for each organization.
To identify the federal civilian, defense, and intelligence
organizations involved in protecting critical infrastructures from
computer-based attacks, and their responsibilities, source of
authority, and current organizational placement, we selected federal or
federally sponsored organizations supporting national or multiagency
efforts that were mentioned in either Presidential Decision Directive
(PDD) 63 or Executive Order 13231, including lead agencies and members
of the President‘s Critical Infrastructure Protection Board. After
identifying the organizations with a national or multiagency cyber CIP
effort, we (1) reviewed agency documents including enabling
legislation, charters, delegations of authority, policy documents,
program and strategic plans, and performance reports; (2) requested
written responses from them on their CIP responsibilities, sources of
authority, organizational placement and reporting relationships, and
funding; (3) interviewed pertinent officials associated with these
organizations; and (4) asked for other organizations within these
organizations that have a national CIP role. Our inventory of
organizations does not include 9 of the 24 largest federal departments
or agencies since they were not specifically identified in PDD
63,[Footnote 22] Executive Order 13231, or by officials we interviewed;
organizations that are responsible for the security of critical cyber
systems, but do not have national cyber CIP responsibilities outside
their agencies, such as the Federal Aviation Administration, the
Centers for Disease Control, the Financial Management Service, and the
National Weather Service; or agencies that have national physical
security CIP responsibilities, such as Treasury‘s Bureau of Alcohol,
Tobacco and Firearms; Transportation‘s Office of Pipeline Safety; and
the Environmental Protection Agency‘s Chemical Emergency Preparedness
and Prevention Office.
To determine the organizations‘ relationships with each other, we (1)
reviewed PDD 63 and Executive Order 13231 and written responses
regarding organizational placement and reporting relationships; (2)
analyzed interdependencies; and (3) held discussions with organization
officials and officials from the oversight and policy making bodies
such as the Critical Infrastructure Assurance Office (CIAO). We also
interviewed the Special Advisor to the President for Cyberspace
Security on current initiatives to improve coordination among these
organizations.
To determine the level of the organizations‘ CIP appropriated funds, we
analyzed agency budget documents and written responses regarding
funding levels. We reviewed recent CIP budget documents created by the
Office of Homeland Security, the Office of Management and Budget (OMB),
and the Congressional Research Service. We also discussed with OMB how
funds are appropriated and tracked for CIP activities.
We performed our work in Washington, D.C., from January through May
2002, in accordance with generally accepted government auditing
standards.
[End of section]
Appendix II: Federal Organizations Involved in National or Multiagency
Cyber CIP Efforts:
The federal organizations listed below have various national or
multiagency responsibilities related to cyber CIP efforts. These
organizations include 5 advisory committees; 6 Executive Office of the
President organizations; 38 executive branch organizations associated
with departments, agencies, or intelligence organizations; and 3 other
organizations. The description of each organization includes its cyber
CIP responsibilities, source(s) of authority, key relationships with
other CIP organizations, and, where available, information on cyber CIP
funds. See figure 4 (in main body of text) for information on
organizational placement.
Federal Advisory Committees:
Federal Advisory Committees are committees, boards, commissions, or
similar groups from the private sector that are established by statute
or established or used by the President or one or more agencies for
providing advice or recommendations to the President or one or more
agencies or federal government officials. Within a year after a
presidential advisory committee submits a public report to the
President, the President or a delegate of the President is required to
report to the Congress proposals for action or reasons for inaction
regarding the recommendations contained in the public report. In
addition, each year the President is required to provide the Congress
with an annual report on the activities, status, and changes in the
composition of advisory committees from the preceding fiscal year.
According to federal documents, the advisory committees for cyber CIP
issues are:
* the National Infrastructure Advisory Council (NIAC),
* the President‘s Council of Advisors on Science and Technology
(PCAST),
* the President‘s National Security Telecommunications Advisory
Committee (NSTAC),
* the President‘s Information Technology Advisory Committee (PITAC),
and:
* the National Science and Technology Council (NSTC).
National Infrastructure Advisory Council:
Executive Order 13130 established NIAC to advise the President on the
security of information systems for critical infrastructure supporting
other sectors of the economy: banking and finance, transportation,
energy, manufacturing, and emergency government services. The members
of NIAC, which were selected from the private sector, academia, and
state and local government, had expertise relevant to the functions of
the committee. One of NIAC‘s main duties was to monitor the development
of private-sector information sharing and analysis centers (ISAC). Just
before leaving office, President Clinton put forward the names of 21
appointees. The order was rescinded by the Bush Administration before
the council could meet. In Executive Order 13231, President Bush
established a National Infrastructure Advisory Council (with the same
acronym, NIAC) whose functions are similar to those of the council
established under the Clinton Administration. The National
Infrastructure Advisory Council is comprised of a group of 30
representatives from private industry and state and local government
that will advise the President on matters relating to cybersecurity and
CIP.
President‘s Council of Advisors on Science and Technology:
A private-sector President‘s Council of Advisors on Science and
Technology assists the National Science and Technology Council to
ensure that federal science and technology policies reflect the full
spectrum of the nation‘s needs. Since its creation, the President‘s
Council of Advisors on Science and Technology has been expanded and
currently consists of 18 members from the private sector plus the
Assistant to the President for Science and Technology, who serves as
the committee‘s co-chair. The committee members, who are appointed by
the President, are drawn from industry, education, research
institutions, and other nongovernmental organizations.
President‘s National Security Telecommunications Advisory Committee:
Executive Order 13231 calls on the President‘s National Security
Telecommunications Advisory Committee to advise the President on the
security and continuity of communications systems essential for
national security and emergency preparedness. In 1982, the President‘s
National Security Telecommunications Advisory Committee, which
comprises presidentially appointed senior executives from up to 30
major U.S. corporations in the telecommunications and financial
services industries, was established to advise the President on
national-security and emergency-preparedness telecommunications
issues.
President‘s Information Technology Advisory Committee:
Under the authority of Executive Order 13035 (1997) and amended by
Executive Order 13092 (1998), the President‘s Information Technology
Advisory Committee provides the President, the Congress, and the
federal agencies involved in information technology (IT) research and
development with expert, independent advice on advanced information
technologies, including the national infrastructure as high-
performance computing, large-scale networking, and high-assurance
software and systems design. As part of this assessment, the committee
reviews the federal networking and IT research and development program.
Leading IT experts from industry and academia comprise the committee as
it helps guide the administration‘s efforts to accelerate the
development and adoption of information technologies. The committee is
formally renewed through presidential executive orders. The current
executive order is due to expire June 1, 2003.
National Science and Technology Council:
The NSTC was established by executive order in 1993 as a cabinet-level
council, with the President serving as chair. This council is the
principal means for the President to coordinate science, space,
technology, and the various parts of the federal research and
development community. An objective of NSTC is establishing clear
national goals for federal science and technology. The council prepares
research and development strategies that are coordinated across federal
agencies to form an investment package aimed at accomplishing multiple
national goals. PDD 63 states that the Office of Science and Technology
Policy shall be responsible for coordinating research and development
programs through the council.
Executive Office of the President:
According to federal documents, the organizations with critical
infrastructure protection responsibilities are as follows:
* the Office of Homeland Security (OHS),
* the National Security Council (NSC),
* the Office of Science and Technology Policy (OSTP),
* the National Economic Council (NEC),
* the Office of Management and Budget (OMB), and:
* the President‘s Critical Infrastructure Protection Board.
Office of Homeland Security:
Established by Executive Order 13228, the mission of the Office of
Homeland Security is to develop and coordinate the implementation of a
comprehensive national strategy to secure the United States from
terrorist threats or attacks. The office, which is led by the Assistant
to the President for Homeland Security, coordinates the executive
branch‘s efforts to detect, prepare for, prevent, protect against,
respond to, and recover from terrorist attacks within the United
States. The office identifies priorities and coordinates efforts for
collecting and analyzing information. The office also identifies, in
coordination with the Assistant to the President for National Security
Affairs, intelligence sources outside the United States regarding
threats of terrorism within the United States. The office also works
with federal, state, and local agencies.
Executive Order 13228 also established the Homeland Security Council
which is responsible for advising and assisting the President regarding
all aspects of homeland security. The council is to serve as the
mechanism for ensuring that homeland-security-related activities of
executive departments and agencies are coordinated and homeland
security policies are effectively developed and implemented. As
previously mentioned, in February 2002, the Office of Homeland Security
published an overview of its proposed $37.7 billion fiscal year 2003
budget. This total includes $722 million for technology to defend the
homeland, a portion of which is to be allocated to several of the
national CIP organizations we identified.
National Security Council:
NSC coordinated the initial development and implementation of PDD 63.
These efforts included developing the National Information System
Defense Plan, monitoring federal agency CIP plans, and fostering a
public/private-sector partnership on information assurance. Under the
current Bush administration, the council underwent a major streamlining
in which all its groups established during previous administrations
were abolished. The responsibilities and functions of the former groups
were consolidated into 17 policy coordination committees. The
activities associated with CIP were assumed by the Counter-Terrorism
and National Preparedness Policy Coordination Committee. The Special
Advisor to the President for Cyberspace Security reports to the
Assistant to the President for National Security Affairs, who leads the
council, and to the Assistant to the President for Homeland Security.
Furthermore, Executive Order 13231 identifies the Assistant to the
President for National Security Affairs as a member of the President‘s
Critical Infrastructure Protection Board.
Office of Science and Technology Policy:
The Office of Science and Technology Policy was established by the
National Science and Technology Policy, Organization, and Priorities
Act of 1976. PDD 63 designates OSTP as the lead agency for research and
development for the government through the National Science and
Technology Council. Recently, Executive Order 13231 created a standing
committee for research and development, which is to be chaired by a
designee of the Director of OSTP. This office serves as the primary
advisor to the President for policy formulation and budget development
on all questions in which science and technology are important
elements. The office also leads an interagency effort to develop and
implement science and technology policies and budgets that are
coordinated across federal agencies. Its Director serves as the
Assistant to the President for Science and Technology. In this
capacity, the Director manages the National Security and Technology
Council and the President‘s Council of Advisors on Science and
Technology.
OSTP‘s Technology Division is responsible for the following: all of
OSTP‘s activities in the area of emergency-preparedness
telecommunications; the NCS; the NSTAC; continuity of government
programs; and infrastructure protection programs. In addition, this
division works closely with the office‘s Science Division on national
security issues. OSTP‘s Assistant Director for Homeland and National
Security fills the post of Senior Director for Research and Development
within the Office of Homeland Security. OSTP‘s official
responsibilities for protecting the domestic infrastructure derive from
both statute and executive order. As a result, OSTP coordinates between
the military and nonmilitary sectors within the government, between the
technical and the policy-making communities, and between the federal
government and state and local governments.
National Economic Council:
PDD 63 tasked NEC to review sector plans and the national plan for CIP
to ensure that they align with the President‘s economic goals.
Additionally, Executive Order 13231 calls on a designee of the chairman
of NEC to work in coordination with the chair of the Private Sector and
State and Local Government Outreach Committee of the President‘s
Critical Infrastructure Protection Board. NEC was established in 1993
within the Office of Policy Development within the Executive Office of
the President to advise the President on matters related to U.S. and
global economic policy. By executive order, NEC has four principal
functions: to coordinate policy-making for domestic and international
economic issues, to coordinate economic policy advice for the
President, to ensure that policy decisions and programs are consistent
with the President‘s economic goals, and to monitor implementation of
the President‘s economic policy agenda.
Office of Management and Budget:
Executive Order 13231 calls on a designee of the Director of OMB to
chair the Executive Branch Information Systems Security Committee of
the President‘s Critical Infrastructure Protection Board. OMB
evaluates, formulates, and coordinates budget and management policies
and objectives among federal departments and agencies, including that
for information security. Some of its primary responsibilities are to
assist the President in developing and maintaining effective
government, developing efficient coordinating mechanisms to expand
interagency cooperation, and developing regulatory reform proposals and
programs. As part of the Floyd D. Spence National Defense Authorization
Act for Fiscal Year 2001, Congress enacted the Government Information
Security Reform Act, tasking OMB with responsibility for establishing
and overseeing policies, standards, and guidelines for information
security. OMB is also required to submit an annual report to the
Congress summarizing results of agencies‘ evaluations of their
information security programs.
President‘s Critical Infrastructure Protection Board:
The Special Advisor to the President for Cyberspace Security heads the
Office of Cyberspace Security as set forth by Executive Order 13231.
The advisor works in close coordination and partnership with the
private sector, which owns and operates the vast majority of America‘s
critical infrastructure. The special advisor also reports to the
Assistant to the President for Homeland Security and to the Assistant
to the President for National Security Affairs. Executive Order 13231
established the President‘s Critical Infrastructure Protection Board to
coordinate the federal efforts and programs associated with protecting
our nation‘s critical infrastructures. The Special Advisor to the
President for Cyberspace Security chairs the board. Executive Order
13231 tasks the board with recommending policies and coordinating
programs for protecting information systems for CIP. The executive
order also established 10 standing committees to support the board‘s
work on a wide range of critical information infrastructure efforts.
The board is also intended to coordinate with the Office of Homeland
Security in activities relating to the protection of and recovery from
attacks against information systems for critical infrastructure,
including emergency preparedness communications that were assigned to
the Office of Homeland Security by Executive Order 13228 of October 8,
2001.
Chief Information Officers Council:
The Chief Information Officers (CIO) Council was established by
Executive Order 13011 in 1996. As set forth in Executive Order 13231,
the vice chair of the CIO Council serves as an official member of the
President‘s Critical Infrastructure Protection Board and sits on the
board‘s coordination committee. The CIO Council serves as the principal
interagency forum for improving practices in the design, modernization,
use, sharing, and performance of federal government agency information
resources. The council‘s role includes developing recommendations for
IT management policies, procedures, and standards; identifying
opportunities to share information resources; and assessing and
addressing the needs of the federal government‘s IT workforce.
Membership on the council comprises CIOs and deputy CIOs from 28
federal executive agencies. The CIO Council serves as a focal point for
coordinating challenges that cross agency boundaries.
National Communications System:
Created by Executive Order 12472, the National Communications System‘s
CIP mission is to assure the reliability and availability of national
security and emergency preparedness (NS/EP) telecommunications. Its
mission includes, but it is not necessarily limited to, responsibility
for (1) assuring the government‘s ability to receive priority services
for NS/EP purposes in current and future telecommunications networks by
conducting research and development and participating in national and
international standards bodies and (2) operationally coordinating with
industry for protecting and restoring NS/EP services in an all-hazards
environment. NCS‘s mission is externally focused on the reliability and
availability of the public telecommunications network. This mission is
carried out within government through the NS/EP Coordinating Committee,
with industry on a policy level in coordination with NSTAC, and
operationally through the National Coordinating Center for
Telecommunications (NCC) and through its participation in national and
international standards bodies. Furthermore, in January 2000, NCC was
designated an ISAC for telecommunications under the provisions of PDD
63.
NCS reports to the Executive Office of the President-NSC for policy,
OSTP for operations, and OMB for budget through the Secretary of
Defense, who is the Executive Agent for NCS. NCS‘s NS/EP Coordinating
Committee is a standing committee under the President‘s Critical
Infrastructure Protection Board. Externally, NCS coordinates with the
Office of Cyberspace Security; CIAO; the National Telecommunications
and Information Administration; the National Infrastructure Protection
Center (NIPC); the General Service Administration‘s (GSA) Federal
Computer Incident Response Center (FedCIRC); the Department of Energy
(including several of the laboratories); the Department of
Transportation (DOT), industry members of the National Coordinating
Center for Telecommunications; ISACs; and numerous Department of
Defense (DOD) organizations.
Federal Communications Commission:
The Federal Communications Commission (FCC) is an independent U.S.
government agency and a nonvoting member of the President‘s Critical
Infrastructure Protection Board. FCC is composed of five commissioners
appointed by the President with the advice and consent of the Senate.
FCC has the authority to define telecommunications service priorities
for national security emergency preparedness when the President has not
invoked his wartime authority. In addition, one designated commissioner
is assigned responsibility for advising and representing the commission
regarding matters of emergency-preparedness and national defense,
including national emergency plans and emergency preparedness of
private-sector communications organizations and continuity of FCC
functions. Recently the commission established an internal advisory
body, the FCC‘s Homeland Security Policy Council, comprising senior
managers from each of the FCC‘s policy, licensing, and operational
bureaus and offices. The Homeland Security Policy Council, which serves
as an advisory council to the chairman on homeland security matters
related to the communications industry, is headed by and reports
directly to the chairman‘s chief of staff. FCC establishes the rules
under which the Emergency Alert System (EAS) operates. EAS provides a
means of addressing the American people in the event of national
emergency. Broadcast stations, cable systems, and participating
satellite programmers install equipment that can transmit a
presidential message to the public. FCC has created two Federal
Advisory Committees to facilitate discussions on infrastructure
protection. The Network Reliability and Interoperability Council and
the Media Security and Reliability Council advise the commission on
incident prevention, system restoration, reliability and public safety
issues related to the communications industries.
U.S. Department of Commerce:
PDD 63 assigned Commerce as the lead sector liaison for information and
communications. Additionally, PDD 63 established a national plan
coordination staff, which became the Critical Infrastructure Assurance
Office, an interagency office housed in Commerce that is responsible
for planning infrastructure protection efforts. Recently, Executive
Order 13231 assigned the Secretary of Commerce to the President‘s
Critical Infrastructure Protection Board and established a standing
committee for private-sector and state and local government outreach,
which is chaired by a designee from Commerce. According to agency
officials and federal documents, the organizations with critical
infrastructure protection responsibilities are as follows:
* the Critical Infrastructure Assurance Office (CIAO),
* the National Institute of Standards and Technology (NIST),
* the National Information Assurance Partnership (NIAP), and:
* the National Telecommunications and Information Administration
(NTIA).
Critical Infrastructure Assurance Office:
As established under PDD 63, CIAO performs a variety of CIP functions
in three major areas: (1) educating the private sector on the
importance of CIP, (2) preparing the national CIP strategy, and (3)
assisting federal civilian agencies and departments in determining
their dependencies on critical infrastructures.
First, CIAO works to educate industry representatives that critical
infrastructure assurance must be addressed through corporate risk
management activities. Its efforts focus on the critical infrastructure
industries (e.g., information and communications, banking and finance,
transportation, energy, and water supply), particularly the corporate
boards and chief executive officers who are responsible for setting
policy and allocating resources for risk management. In addition to
infrastructure owners and operators, this office‘s awareness and
outreach efforts also target members of the audit, insurance, and
investment communities. CIAO‘s goal is to educate these groups on the
importance of assuring effective corporate operations, accountability,
and information security.
Second, CIAO is tasked with working with government and industry to
prepare the national strategy for CIP, which is due for completion in
2002. This strategy will serve as the basis for CIP legislative and
public policy reforms, where needed. The development of the national
strategy for CIP is to also serve as part of an ongoing process in
which government and industry will continuously modify and refine their
efforts to ensure the safety of critical information systems.
Third, CIAO is responsible for assisting civilian federal agencies and
departments in analyzing their dependencies on critical
infrastructures. This mission is conducted under Project Matrix, a
program designed to identify and characterize the assets and associated
infrastructure dependencies and interdependencies that the government
requires to fulfill its most critical responsibilities. Project Matrix
involves a three-step process in which each federal civilian agency
identifies (1) its critical assets; (2) other federal government
assets, systems, and networks on which those critical assets depend to
operate; and (3) all associated dependencies on privately owned and
operated critical infrastructures.
Additional cyber CIP duties were added to CIAO under Executive Order
13231, including having its director serve as a member of and advisor
to the President‘s Critical Infrastructure Protection Board. CIAO will
also support the activities of the National Infrastructure Advisory
Council, a group of 30 representatives from private industry and state
and local government that will advise the President on matters relating
to cybersecurity and CIP. In addition, CIAO will administer a Homeland
Security Information Technology and Evaluation Program to study and
develop methods to improve information sharing among federal agencies
and state and local governments.
CIAO‘s reported CIP funding to support these activities for fiscal
years 2000 through 2002 has been about $4.4 million, $4.8 million, and
$6.4 million, respectively.
National Institute of Standards and Technology:
NIST is a nonregulatory federal agency within Commerce‘s Technology
Administration that works with industry, federal agencies, testing
organizations, standards groups, academia, and private-sector users to
improve critical infrastructure security. Policy guidance that directs
NIST‘s CIP-related activities includes Executive Order 13231, the
Computer Security Act of 1987, the Government Information Security
Reform Act of 2001, and OMB‘s Circular A-130, Appendix III.
First, NIST supports federal departments and agencies by developing
security standards and guidelines for sensitive federal systems as
defined under the Computer Security Act of 1947. For example, the
institute works with industry to develop voluntary industry standards
that support cybersecurity, interoperability, and data exchange. Such
standards are to be used to support the operation of the Internet. NIST
participants formulate public specifications that assist industry to
improve the security and competitiveness of commercial products and to
inform consumers.
Second, NIST also helps to improve the security of commercial IT
products that provide the communications and information processing
backbone of the nation‘s infrastructure. NIST develops tests, tools,
profiles, implementation methods, and recommendations for timely and
cost-effective testing programs. Validation programs developed by NIST
are conducted in cooperation with private-sector testing laboratories.
NIST coordinates with a wide variety of IT security organizations in
the federal government and the private sector. In the federal
government, major constituents and collaborators include OMB, the
National Security Agency, the General Services Administration, and the
departments of Treasury and Health and Human Services. Key interactions
include the Federal Public Key Infrastructure Steering Committee and
its working groups, the Center for Internet Security, the Federal
Computer Security Managers‘ Forum, the Federal CIO Council, the
Committee for National Security, and the Executive Branch Information
Systems Security. Examples of IT industry associations with which NIST
works include the banking standards community and the Smart Card
Consortia. Some key industry collaborations include those with Intel,
Microsoft, RSA, IBM, Counterpane Systems, Motorola, Entrust, and
Certicom.
NIST‘s CIP funding to support these activities for 2002 and 2003 has
been $11 million and $15 million, respectively.
National Information Assurance Partnership:
NIAP is a U.S. government initiative designed to meet the security
testing, evaluation, and assessment needs of IT producers and
consumers. NIAP collaborates with NIST and the National Security Agency
in fulfilling their respective responsibilities under the Computer
Security Act of 1987. The partnership, originated in 1997, promotes the
development of technical security requirements for IT products and
systems and appropriate metrics for evaluating those products and
systems. NIAP collaborates with government agencies and industry in a
variety of areas to help meet current and future IT security challenges
affecting the nation‘s critical information infrastructure. One recent
NIAP initiative under way is collaborating with industry in developing
protection profiles for key information technologies supporting
homeland defense.
National Telecommunications and Information Administration:
As the lead agency for the information and communications
infrastructure sector under PDD 63, Commerce was assigned
responsibility for economic security aspects of CIP, which it delegated
to NTIA. To fulfill its mission, NTIA conducts five major activities.
First, it works to raise the information and communications sector‘s
awareness of cyber vulnerabilities and risks. It then assists this
sector in eliminating or mitigating these vulnerabilities. Third, it
facilitates the establishment and operation of the information and
communications sectors‘ ISACs. Fourth, it develops partnerships with
other countries and international organizations to achieve compatible
security policies and strategies. Finally, it provides industry with
results from government-based research and development efforts
regarding CIP.
To fulfill these responsibilities, NTIA coordinates with a variety of
organizations within the government and the private sector. Within
Commerce, NTIA coordinates primarily with the CIAO and NIST. Within the
federal government, NTIA coordinates with the chair of the President‘s
Critical Infrastructure Protection Board. Within the private sector,
NTIA works with three trade associations that serve as sector
coordinators: the Information Technology Association of America, the
Telecommunications Industry Association, and the United States Telecom
Association.
U.S. Department of Defense:
PDD 63 identifies national defense as a special function related to CIP
and designates DOD as the lead agency for this function. Recently,
Executive Order 13231 assigned the Secretary of Defense to the
President‘s Critical Infrastructure Protection Board and established
three standing committees that will be chaired or co-chaired by DOD,
including the Committee on National Security Systems, the Incident
Response Coordination Committee, and the Physical Security Committee.
According to agency officials and federal documents, the organizations
with critical infrastructure protection responsibilities are as
follows:
* the Joint Staff;
* the Office of the Assistant Secretary of Defense, Command, Control,
Communications, and Intelligence (ASD/C3I);
* the Defense Advanced Research Projects Agency (DARPA);
* the Defense Threat Reduction Agency (DTRA);
* the National Security Agency (NSA);
* the Defense Intelligence Agency (DIA); and:
* the Joint Task Force for Computer Network Operations (JTF-CNO).
Joint Staff:
The Joint Chiefs of Staff serve as the primary military advisors to the
President and, regarding CIP, the chairman of the Joint Chiefs of Staff
is responsible for ensuring that critical assets are identified for
executing deliberate and crisis action plans and planning for
mitigating their loss or disruption. Within the Joint Chiefs of Staff,
the Joint Staff serves as special function representative for military
plans and operations within the DOD CIP Integration Staff. The Joint
Staff is divided into eight directorates: J1-Manpower; J2-Intelligence;
J3-Operations; J4-Logistics; J5-Strategic Plans; J6-Command, Control,
Communications, and Computers (C4) Systems; J7-Operational Plans; and
J8-Force Structure. The J5 CIP office governs the physical aspects of
CIP, and the J6 directorate governs the cyber aspects and
responsibilities for the Joint Staff.
DOD‘s Joint Staff coordinates with several organizations, including
Combatant Commands; Services; various government agencies; the
President‘s Critical Infrastructure Protection Board, chaired by the
Office of Cyberspace Security; the CIAO at Commerce; the NIPC in the
FBI; the ASD/C3I; DOT, Office of Security and Intelligence; Office of
Homeland Security, Senior Director-Protection and Prevention; the
National Security Incident Response Center, chaired by the National
Security Agency; the Defense Information Systems Agency; DOD‘s Computer
Emergency Response Teams (CERT); the Joint Task Force Computer Network
Defense; FedCIRC; and the Carnegie Mellon CERT® Coordination Center.
The Joint Staff did not receive a specific CIP appropriation before the
Defense Emergency Response Funding, which was provided in response to
the attacks on September 11. The Joint Staff received $500,000 for CIP
through the Defense Emergency Response Funding that was specifically
earmarked for CIP in addition to funds not specifically earmarked for
CIP.
Office of the Assistant Secretary of Defense, Command, Control,
Communications and Intelligence:
In accordance with PDD 63, DOD is responsible for identifying the
national defense infrastructure and working with the national CIP
organizational structure and the private sector to ensure its
protection. ASD/C3I manages DOD‘s CIP program and is responsible for
its CIP policy development. DOD‘s CIP program is developing to ensure
that critical cyber and physical infrastructure assets that DOD depends
on are available to mobilize, deploy, and sustain military operations.
ASD/C3I (CIP) develops CIP policy, advocates funding, and oversees
implementation of the CIP program. This office oversees DOD‘s Critical
Infrastructure Protection Integration Staff (CIPIS). CIPIS receives
input from DOD‘s defense sectors, lead components, and special function
components.
Defense Advanced Research Projects Agency:
Executive Order 13231 directs DARPA to work in coordination with the
National Science Foundation as members of the President‘s Critical
Infrastructure Protection Board‘s Committee on Research and
Development. In this capacity, DARPA is to assist with federal
government research and development for protecting critical
infrastructure information systems, including emergency preparedness
communications and the physical assets that support such systems, and
ensure that government activities are coordinated with corporations,
universities, federally funded research centers, and national
laboratories. DARPA‘s Information Technology Office performs research
on information technologies for use in advanced defense applications.
The office‘s mission is to provide the networking and computing
hardware, software, systems, and management technologies vital to
ensuring DOD‘s military superiority. The office is addressing IT issues
of strategic concern, such as security, interoperability, and
survivability technologies.
Defense Threat Reduction Agency:
Directed by PDD 63, DTRA‘s CIP-related efforts encompass technology
development and combat support. This agency‘s technology development
efforts include managing the development of the National Infrastructure
Simulation and Analysis Center (NISAC) and the technical development
under its Mission Degradation Analysis (MIDAS) program. NISAC is a
joint effort between DTRA and Department of Energy‘s (DOE) national
laboratories to develop an architecture to simulate and analyze the
nation‘s civilian infrastructures. The MIDAS program is a research
effort to determine DOD mission degradation due to degradation in
supporting infrastructures. DTRA‘s combat support efforts include
Balanced Survivability Assessments, Joint Staff Integrated
Vulnerability Assessments, and the Chemical-Biological Sea Port
Protection Analysis.
DITRA‘s director reports directly to the Assistant to the Secretary of
Defense, Nuclear Chemical Biological. Regarding CIP research and
development, DTRA coordinates with internal DOD offices and DOE, and
has begun to coordinate with the Office of Homeland Security in
managing NISAC.
DTRA received appropriations designated for some of its CIP and CIP-
related projects for fiscal years 2000, 2001, and 2002, but funding for
the remaining CIP efforts were funded through the agency‘s budgeting
process. MIDAS received the following amounts in appropriations: fiscal
year 2000, $1.7 million; fiscal year 2001, $2.4 million; and fiscal
year 2002, $2.7 million. The Critical Infrastructure Protection Act of
2001, which was enacted as part of the USA PATRIOT Act, authorized $20
million for NISAC for fiscal year 2002. The Balanced Survivability
Assessments effort received $8.9 million in fiscal year 2000, $15.8
million in fiscal year 2001, and $17.6 million in fiscal year 2002.
National Security Agency:
NSA‘s primary CIP mission is protecting national security
telecommunications and information systems. The Information Assurance
Director falls under the purview of the Director, NSA, who is
responsible for fulfilling NSA‘s CIP duties. NSA‘s IAD performs these
duties through assessing the vulnerability of the security of
information systems, assessing operations security; evaluating and
assessing security measures in national security systems; and
addressing the threat, detection, reaction, warning, and response to
intrusions into national security systems.
Furthermore, the National Security Incident Response Center is NSA‘s
focal point for addressing computer incidents affecting the U.S.
government‘s national security information systems. The center‘s CIP
duties include providing warnings of threats against U.S. information
systems in a timely manner and providing assistance to defense and
civil agencies in isolating, containing, and resolving incidents that
threaten national security systems. The center also assists the JTF-
CNO, FedCIRC, and NIPC in isolating, containing, and resolving attacks
and unauthorized intrusions threatening national security systems.
NSIRC coordinates its incident reporting and vulnerability assessments
with these entities for attacks and intrusions directed against
national security systems. The center‘s vulnerability assessments are
used to develop hardware and software computer network defenses. NSA
works with NIST to evaluate commercial off-the-shelf products. In
addition, NSA coordinates with the President‘s Critical Infrastructure
Protection Board, the Committee for National Security Systems, and ASD/
C3I.
Defense Intelligence Agency:
DIA‘s CIP mission includes collecting and analyzing intelligence data
concerning threats to and vulnerabilities of critical infrastructures.
A senior staff member of the agency serves as the DOD Intelligence,
Surveillance, and Reconnaissance (ISR) CIAO, as well as the
Intelligence Special Function Coordinator for all DOD sectors. The ISR
CIAO is responsible for developing the ISR Sector Assurance Plan and
the ISR Sector Registered Asset List of identified critical assets.
These roles are a key element of the DOD-wide CIP program led by ASD/
C3I.
DIA received appropriations for some of its CIP and CIP-related
projects for fiscal years 2000, 2001, and 2002, but funding for the
remaining CIP efforts were funded through the DIA‘s budgeting process.
Joint Task Force--Computer Network Operations:
JTF-CNO, the United States Space Command‘s operational component for
computer network operations, is the primary DOD organization for
coordinating and directing internal activities to detect computer-based
attacks, contain damage, and restore computer functionality when
disruptions occur. JTF-CNO leverages the existing intrusion detection
capabilities of the unified commands, its components, and DOD and non-
DOD agencies. JTF-CNO receives intrusion data from these sources and
integrates these data with intelligence, operational, and technical
data. The 2001 JTF-CNO expansion is to allow it to increase JTF-CNO‘s
ability in (1) performing preventative activities, such as conducting
security reviews and issuing vulnerability alerts; (2) coordinating and
monitoring detection activities performed by components, including
monitoring automated intrusion-detection systems; (3) investigating
and diagnosing incidents; and (4) handling and responding to events,
which involves disseminating information and providing technical
assistance to system administrators so that they can appropriately
respond to cyberattacks. JTF-CNO maintains a relationship with CERT®/
CC, NIPC, and FedCIRC by participating in joint technical exchanges,
working groups, and countermeasure development teams.
Director of Central Intelligence:
PDD 63 identifies intelligence as a special function related to CIP and
designates the Central Intelligence Agency (CIA) as the lead agency for
this function. Recently, Executive Order 13231 assigned the Director of
Central Intelligence to the President‘s Critical Infrastructure
Protection Board. Additionally, the National Security Act of 1947
designates the Director of Central Intelligence as the primary adviser
on national foreign intelligence to the President and the National
Security Council, as well as to officials who make and execute U.S.
national security policy.
According to agency officials and federal documents, the organizations
with critical infrastructure protection responsibilities are as
follows:
* the Central Intelligence Agency (CIA),
* the National Intelligence Council (NIC), and:
* the National Foreign Intelligence Board (NFIB).
Central Intelligence Agency:
The CIA‘s mission is to provide accurate, comprehensive, and timely
intelligence on national security topics. PDD 63 directed the CIA to
enhance its capabilities to provide intelligence support for threat
assessment and warning and to engage in incident response as needed.
Since that time, the agency reports that it has made improvements in
analytic capabilities and intragovernment coordination regarding
mutual analysis, information sharing, and computer incident responses.
In addition, the agency established the Information Operations Center
to address the growing cyberthreats. CIA involvement in protecting the
information infrastructure also extends to participating with other
federal agencies and the private sector. In particular, the CIA has
assisted the FBI‘s NIPC by providing technical and analytic support and
disseminating cyberthreat assessments. In addition, CIA has
collaborated with NIPC and others in the intelligence community to
develop and present outreach briefings on foreign cyberthreats to key
infrastructure stakeholders, including elements of the private sector.
CIA collects foreign intelligence information through a variety of
clandestine and overt means. First, the Directorate of Operations has
primary responsibility for the clandestine collection of foreign
intelligence. This directorate is divided administratively into area
divisions, as well as several staffs, centers, and one division that
deals with transnational issues. Second, the Directorate of Science and
Technology (DS&T) provides a wide range of collection support to the
CIA and the intelligence community, including human source intelligence
collection efforts and agent communications. This directorate supports
the National Imagery and Mapping Agency with a cadre of affiliated
personnel who serve in key technical positions. Open-source collection
(collection of information from foreign radio, television, newspapers,
magazines and journals, commercial databases, etc.) is also
administered in the DS&T. In addition, this directorate provides
collection support for signal intelligence and measurement and
signature intelligence.
Once the intelligence has been collected, CIA analysts produce a
variety of finished intelligence products that support national-level
policy deliberations. The Directorate of Intelligence serves as the
executive agency for meeting the bulk of CIA‘s finished intelligence
products for the policy-making community through a number of
suboffices, including the Office of Russian and European Analysis; the
Office of Near Eastern, South Asian, and African Analysis; the Office
of Asian Pacific and Latin American Analysis; and the Office of
Transnational Issues. In addition, DS&T produces a number of
unclassified products derived from open-source materials.
National Intelligence Council:
The National Intelligence Council serves as a senior advisory group to
the DCI in his capacity as leader of the intelligence community. This
council is responsible for determining and promulgating the
intelligence community‘s judgments on issues of importance to
policymakers. Consequently, most of its publications are produced by
interagency teams and formally coordinated with all intelligence
agencies possessing relevant expertise.
NIC comprises national intelligence officers, experts drawn from all
elements of the intelligence community, from outside of government in
academia, and from the private sector. National intelligence officers
provide mid-and long-term strategic thinking and production by
concentrating on substantive problems of particular geographic regions
of the world and of particular functional areas (economic and global
issues, general-purpose forces, science and technology, strategic
programs and nuclear proliferation, and warning). NIC supervises the
production of national intelligence estimates and publications, briefs
senior policymakers, and focuses intelligence community collection and
analytic resources on priority issues. In particular, this council has
produced several documents related to CIP, including a classified 2001
national intelligence estimate on cyberthreats.
National Foreign Intelligence Board:
The National Foreign Intelligence Board, an advisory board to the
Director of Central Intelligence, has existed in one form or another
since the founding of the CIA in 1947. The board includes
representatives from all of the agencies that make up the intelligence
community (including NIC, CIA, DOD, State, Treasury, FBI, and DOE). In
particular, the board is responsible for producing, reviewing, and
coordinating national foreign intelligence, and the bulk of its work is
to review and approve national intelligence estimates that are created
by NIC.
U.S. Department of Energy:
PDD 63 assigned DOE as the lead sector liaison for the national energy
infrastructure, including electric power and oil and gas production and
storage. Recently, Executive Order 13231 assigned the Secretary of
Energy to the President‘s Critical Infrastructure Protection Board and
established a standing committee for infrastructure interdependencies,
which is co-chaired by designees from DOE and DOT. According to agency
officials and federal documents, the organizations with critical
infrastructure protection responsibilities are as follows:
* the Office of Energy Assurance (OEA) and:
* the National Laboratories.
Office of Energy Assurance:
According to its officials, DOE is currently restructuring the offices
that handle security and emergency management for both physical-and
cyber-based CIP under the OEA. This office will work with the states
and industry to allow for a secure and reliable flow of energy to
America‘s home, industry, and public-service facilities, as well as the
transportation system, in direct support of the President‘s national
energy policy and PDD 63.
Three offices will carry out OEA‘s functions. First, the Office of
Energy Reliability coordinates DOE policy development and
intergovernmental and interagency activities related to the protection
and reliability of the national energy infrastructure. This office will
be responsible for developing and maintaining a national strategy for
energy assurance in support of the President‘s national energy policy.
It will also provide leadership for intradepartmental energy-assurance
activities and represent DOE in interagency, intergovernmental, and
other energy-assurance-related forums. The office will develop a
national tracking and reporting process to assess the ongoing
effectiveness of the national strategy to identify shortfalls and
develop corrective action plans.
Second, the Office of Energy Emergencies will work to ensure that DOE
can support state and industry efforts to plan for, respond to, and
mitigate actions that disrupt the energy infrastructure. The office
will identify potential threats to the national energy infrastructure
and communicate information about them to the appropriate authorities
to facilitate emergency planning and response. This communications and
liaison network will also be maintained during emergencies. The office
will develop plans for federal responses to energy emergencies. In
addition, the office will assist states and industry by providing
technical and professional assistance in the development, testing, and
revision of their own emergency response plans.
Third, the Office of Critical Infrastructure Protection will work with
national energy organizations within the government and private
industry in developing the capability required for protecting the
nation‘s energy infrastructure. The office will assess the
vulnerability of the national energy infrastructure to cyber or
physical disruptions and identify technologies and capabilities that
can protect our nation‘s critical energy infrastructures and facilitate
their use by the private sector and federal agencies. The office will
develop and maintain interdependency models and planning tools to
assist federal and state government and private industry in
anticipating system failures and understanding the cascading effects of
single point failures (system failures experienced at centralized
network hubs). In addition, the office will coordinate national
laboratory research and development programs related to mitigating
national energy infrastructure vulnerabilities. This office will be
DOE‘s representative to the Critical Infrastructure Coordination Group
and the National Infrastructure Assurance Council.
National Laboratories:
DOE funds several national laboratories that conduct CIP-related
research. For example, Argonne Laboratories has been working on CIP
since 1997 by performing system mapping activities and vulnerability
testing. Also, Sandia National Laboratories has established the
Information Design Assurance Red Team (IDART). The team works in the
areas of information operations and security of critical
infrastructures. IDART assessments evaluate projects and programs for
system vulnerabilities in the areas of information warfare, information
assurance, and information security.
U.S. Department of Justice:
PDD 63 assigned Justice as the lead sector liaison for emergency law
enforcement services and for the special function of law enforcement
and internal security. Recently, Executive Order 13231 assigned the
Attorney General or designee to the President‘s Critical Infrastructure
Protection Board and co-chair of the Incident Response Coordination and
Physical Security committees. According to agency officials and federal
documents, the organizations with critical infrastructure protection
responsibilities are as follows:
* the Computer Crime and Intellectual Property Section (CCIPS),
* the National Infrastructure Protection Center (NIPC),
* the National Counter Intelligence Executive (NCIX), and:
* the Cyber Crime Division.
Computer Crime and Intellectual Property Section:
Within the Criminal Division, the CCIPS investigates and prosecutes
cyberattacks on our nation‘s critical infrastructure. This section also
addresses policy and legislation issues such as information sharing
among the military, the intelligence community, law enforcement,
civilian agencies and the private sector, as well as government network
intrusion detection and strategic planning. CCIPS coordinates with DOD,
CIAO, NIPC, NSC, and interagency groups that work on CIP issues,
including work on the national plan to defend cyberspace and the cyber
portion of the 5-year counterterrorism plan.
National Infrastructure Protection Center:
NIPC, a multiagency organization located within the FBI, detects,
analyzes, and warns of cyberthreats to and/or attacks on the
infrastructure, should they occur. NIPC‘s mission is based on
authorities given in Executive Order 13231 and PDD 63. In addition, the
center is responsible for accomplishing the FBI‘s role as lead agency
for sector liaison for the Emergency Law Enforcement Services Sector.
As a sector liaison, NIPC provides law enforcement response for
cyberthreats and crimes involving or affecting critical
infrastructures. NIPC also facilitates and coordinates the federal
government‘s response to cyber incidents, mitigating attacks, and
investigating threats, as well as monitoring reconstitution efforts.
NIPC regularly coordinates with federal, state, local, and law
enforcement and intelligence agencies resident in the NIPC: FBI, DOD,
CIA, NSA, the United States Secret Service (USSS), Commerce, DOT, DOE,
and other federal agencies on the President‘s Critical Infrastructure
Protection Board, as well as Canada and Great Britain.
In addition, NIPC runs the National InfraGard program, which is a
cooperative undertaking between the federal government and an
association of businesses, academic institutions, state and local law
enforcement agencies, and other participants dedicated to increasing
the security of critical infrastructures. InfraGard‘s goal is to enable
the flow of information so that the owners and operators of
infrastructure assets, the majority of which are from the private
sector, can better protect themselves and so that the U.S. government
can better discharge its law enforcement and national security
responsibilities. InfraGard provides members a forum for education and
training on infrastructure vulnerabilities and protection measures and
with threat advisories, alerts, and warnings.
NIPC comprises three sections: (1) the Computer Investigations and
Operations Section, which is the operational and response arm and is
responsible for designing, developing, implementing, and managing
automated tools NIPC uses to collect, analyze, share, and distribute
information; and coordinating computer investigations conducted by the
FBI‘s 56 field offices and approximately 400 sublocations throughout
the country; (2) the Analysis and Warning Section, which is the
indication and warning arm, which provides support during computer
intrusion investigations; and (3) the Training, Outreach, and Strategy
Section, which provides outreach to the private sector and to local law
enforcement, and training and exercise programs for cyber and
infrastructure protection investigators within the FBI and other
agencies. NIPC‘s funding to support these activities for fiscal years
2000 through 2002 has been $21 million, $26 million, and $72 million,
respectively.
National Counter Intelligence Executive:
Executive Order 13231 requires NCIX to coordinate with the President‘s
Critical Infrastructure Protection Board to address threats from
hostile foreign intelligence services to programs within the board‘s
purview. Created by PDD 75, ’Counterintelligence for the 21st Century,“
NCIX is appointed by, and reports to, the Director of the FBI, who is
the chair of the Counterintelligence Board of Directors. NCIX serves as
the substantive leader of national-level counterintelligence,
identifying critical assets, producing strategic counterintelligence
analyses, developing a national threat assessment, formulating a
national counterintelligence strategy, creating an integrated
counterintelligence budget, and developing an agenda of program reviews
and evaluations.
Cyber Crime Division:
A recent restructuring within the FBI has resulted in a new division
called the Cyber Crime Division. The mission of this division has not
been finalized.
U.S. Department of Transportation:
PDD 63 assigned DOT as the lead sector liaison for aviation, highways,
mass transit, pipelines, rail, and waterborne commerce. Recently,
Executive Order 13231 assigned the Secretary of Transportation or
designee to the President‘s Critical Infrastructure Protection Board
and as co-chair of the Infrastructure Independencies Committee.
According to officials, DOT is in the process of establishing the
Transportation Security Administration, which was required by the
Aviation and Transportation Security Act (P.L. 107-71, Nov. 19, 2001).
According to its officials, the department is still determining how CIP
responsibilities might be aligned under the new organization.
Currently, the Office of Intelligence and Security (OIS) is
Transportation‘s lead office in fulfilling its national CIP
responsibilities.
Office of Intelligence and Security:
Within the Office of the Secretary of Transportation, OIS analyzes,
develops, and coordinates departmental and national policies addressing
national defense, border security, and transportation infrastructure
assurance and protection issues. The office also coordinates with the
public and private sectors, international organizations, academia, and
interest groups regarding issues of infrastructure protection, national
defense, and drug and migrant interdiction, including serving as the
DOT CIP coordinator and sector liaison official under PDD 63 and its
lead for both PDD 62 and Executive Order 13231.
Outside DOT, OIS serves the secretary as the transportation sector
liaison official under PDD 63. To fulfill this role, OIS establishes
sector coordinators, such as the Association of American Railroads and
the Airport Councils International-North America, and is the primary
liaison with the Office of Homeland Security, the Office of Cyberspace
Security, the intelligence and law enforcement community, and DOD,
especially the U.S. Transportation Command. OIS is the transportation
sector‘s primary point of contact for all security issues, including
coordinating countermeasures and disseminating threat information.
Environmental Protection Agency:
PDD 63 designates the Environmental Protection Agency (EPA) as the lead
agency for sector liaison for protecting the water supply. Presidential
decision directives 39, 62, and 63 mandate EPA participation in a
federal response program specifically aimed at preparing for and
responding to terrorist incidents. According to agency officials, EPA
and the Office of Homeland Security are currently discussing also
designating EPA as the lead agency for sector liaison for chemical
preparedness. The Office of Water is the lead EPA office in fulfilling
EPA‘s national CIP responsibilities.
Office of Water:
As a result of concerns raised since September 11, the Office of Water
has expanded its focus to provide technical and financial assistance
for vulnerability assessments, and emergency response planning for
drinking water and wastewater utilities. This office also works to
improve knowledge and develop new technologies that will help utilities
protect assets and public health through cooperative research with
other federal agencies and nongovernmental organizations. Finally, the
Office of Water facilitates communications among utilities and
government officials at all levels regarding preparedness and response
activities involving the water sector. In this regard, the office
currently is reviewing the interdependencies between areas such as
energy, wastewater, and transportation.
Federal Emergency Management Agency:
PDD 63 assigned FEMA as the lead sector liaison for the emergency fire
service and continuity of government and the responsibility for
developing a national infrastructure assurance plan. In addition,
Executive Order 13231 assigned the Director of FEMA or designee to the
President‘s Critical Infrastructure Protection Board. FEMA supports
state and local emergency-management programs by funding emergency
planning, training emergency managers and local officials, conducting
large-scale tests, and sponsoring programs that teach the public how to
prepare for disasters. According to FEMA officials, the agency‘s CIP
roles are still evolving. In the past, FEMA focused primarily on
physical preparedness, response, and recovery. However, recently, FEMA
officials stated that the agency is exploring ways to better help local
officials regarding cyber issues. FEMA plans to handle cyberattacks
similar to the outreach done for natural disasters. According to agency
officials and federal documents, the organizations with critical
infrastructure protection responsibilities are as follows:
* the Office of National Preparedness (ONP),
* the United States Fire Administration (USFA), and:
* the Office of the Chief Information Officer (OCIO) and Information
Technology Services Directorate.
Office of National Preparedness:
Regarding CIP, the Office of National Preparedness provides leadership
in coordinating and facilitating all federal efforts to assist state
and local emergency-management and emergency-response organizations.
The assistance includes planning; training; equipment and exercises
necessary to build and sustain the capability to respond to any
emergency or disaster, including a terrorist incident involving a
weapon of mass destruction, as well as other natural or man-made
hazards. This office coordinates with the Office of Homeland Security
to develop a national strategy to protect against, respond to, and
recover from terrorist threats and incidents that affect the United
States and its citizens. To fulfill this goal, the Office of National
Preparedness coordinates, integrates, and implements all federal
programs and activities that develop, build, and maintain federal,
state, and local consequence management capabilities, including first
responders. It coordinates, implements, and administers a national
capability assurance program that employs standards, assessments,
exercises, lessons learned from disasters, and corrective actions to
ensure fully interoperable and continually validated federal, state,
and local response capabilities. This office also administers grant
programs for obtaining the needed levels of consequence management
capabilities at the state and local levels of government. ONP‘s
director, who has been designated as the FEMA/CIAO, oversees FEMA‘s PDD
63 sector responsibilities in support of emergency fire services and
continuity of government services.
United States Fire Administration:
The United States Fire Administration maintains a CIP information
center that serves as the information sharing and analysis center for
the emergency fire services sector as envisioned under PDD 63. The
center provides information to over 33,000 local fire and rescue
departments, who, as emergency first responders, have the
responsibility to prioritize the infrastructures that must be protected
from attack. The Fire Administration also maintains the national fire
data center, which proposes possible solutions and national priorities,
monitors resulting programs, and provides information to the public and
fire organizations.
Office of the Chief Information Officer and Information Technology
Services Directorate:
The Chief Information Officer (CIO) will support FEMA‘s CIAO in an
advisory capacity for all cyber infrastructure protection issues,
including those that affect the sectors for which FEMA is the lead
agency. As FEMA‘s executive agency for cybersecurity, the CIO will also
support FEMA‘s CIAO in meeting its PDD 63 responsibilities for internal
cyber infrastructure protection. Finally, the CIO will advise the
sector liaisons for emergency fire services and continuity of
government services on cyber infrastructure issues.
U.S. General Services Administration:
Recently, Executive Order 13231 assigned the Administrator of the GSA
to the President‘s Critical Infrastructure Protection Board. According
to agency officials and federal documents, the organizations with
critical infrastructure protection responsibilities are as follows:
* the Federal Computer Incident Response Center (FedCIRC) and:
* the Office of Acquisition Policy.
Federal Computer Incident Response Center:
In support of PDD 63 and the Government Information Security Reform
Act, FedCIRC provides a central focal point for computer incident
reporting, providing assistance to civilian agencies with independent
prevention and response. GSA administers FedCIRC through the Office of
Information Assurance and Critical Infrastructure Protection in the
Federal Technology Service. FedCIRC‘s mission is to ensure that the
government has critical services available to withstand or quickly
recover from attacks against its information resources.
FedCIRC provides the means for federal agencies to work together to
handle security incidents, share related information, solve common
security problems, collaborate with the President‘s Critical
Infrastructure Protection Board and the NIPC for planning future
infrastructure protection strategies and deal with criminal activities
that pose a threat to the critical information infrastructure. FedCIRC
distributes advisories and vulnerability notes via e-mail and on its
home page, as well as through a quarterly newsletter for information
security managers/officers and system administrators.
FedCIRC provides a computer security incident-response service to
collect and analyze incident information from all federal civilian
agencies. With this service, incidents can be rapidly analyzed so that
warnings are issued when a threat is discovered. In addition, FedCIRC
researches and analyzes computer incidents and vulnerabilities in
detail to identify potential risks to the information infrastructure
and works with the IT community to address and resolve these risks.
Beginning in June 2002, FedCIRC is offering a ’patch authentication and
dissemination capability“ to identify vendor patches needed to correct
known vulnerabilities in agency computer systems. FedCIRC will notify
agencies when vulnerabilities are identified, test the patches to
verify that they correct the intended vulnerabilities, and make them
available to agencies.
FedCIRC‘s funds specifically appropriated for cyber CIP for fiscal
years 2002 and 2003 were $10 million and $11 million, respectively.
Office of Acquisition Policy:
PDD 63 tasked GSA, in coordination with Commerce and DOD to assist
federal agencies in implementing best practices for information
assurance within their individual agencies. In addition, GSA is to
identify large procurements related to infrastructure assurance, study
whether the procurement process reflects the importance of
infrastructure protection and, if necessary, propose revisions to the
overall procurement process. The Office of Acquisition Policy has a
major role in developing, maintaining, issuing, and administering
guiding principles via the Federal Acquisition Regulation, which is
applicable to all executive branch agencies.
Department of Health and Human Services:
PDD 63 appoints the Department of Health and Human Services (HHS) as
the lead agency for sector liaison for protection of the health
services infrastructure. This role includes public health services and
prevention, surveillance, laboratory services, and personal health
services. In addition, Executive Order 13231 assigned the Secretary of
HHS or designee to the President‘s Critical Infrastructure Protection
Board. Agency officials stated that the department is experiencing many
changes and reorganizations and, as a result, is reexamining its
responsibilities for CIP. HHS‘s Deputy Secretary is charged with
overall responsibility for the CIP program, and the department‘s PDD 63
responsibilities are evolving. The Office of Emergency Preparedness
(OEP) is HHS‘s lead office in fulfilling its national CIP
responsibilities.
Office of Emergency Preparedness:
The Office of Emergency Preparedness has departmental responsibility
for managing and coordinating federal health; medical-and-health-
related social services; and recovery to major emergencies and
federally declared disasters, including natural disasters,
technological disasters, major transportation accidents, and
terrorism. As the lead federal agency for health and medical services
within the federal response plan, HHS designated this office to work in
partnership with FEMA and the federal interagency community. The Office
of Emergency Preparedness also directs and manages the National
Disaster Medical System, a cooperative asset-sharing partnership
between HHS, DOD, the Department of Veteran Affairs, FEMA, state and
local governments, private businesses, and civilian volunteers. The
office is also responsible for federal health and medical response to
terrorist acts involving weapons of mass destruction.
National Science Foundation:
The National Science Foundation (NSF) funds CIP-related research in
reliable and secure cyber infrastructures, including research on
computer and network security and assured information technologies
intended to provide sustainable communications and operations in the
aftermath of a catastrophic event. NSF‘s CIP-related funding also
includes research on decision science; emergency response and recovery;
and the interdependencies and vulnerabilities of physical
infrastructure systems, including electrical power, transportation,
energy, and water. Under Executive Order 13231, NSF participates in the
Critical Infrastructure Protection Board Research and Development
Standing Committee and Working Committee and supports studies at the
request of the President‘s Critical Infrastructure Protection Board.
Previously, the foundation participated in the interagency Critical
Infrastructure Protection Working Group established in response to PDD
63. NSF is involved in other research and development coordination
efforts relevant to CIP, including a leadership role in the Information
Technology Research and Development Working Group and interaction with
the Presidential Information Technology Advisory Committee. Its
responsibilities established under PDD 63 include education for a
cybersecurity workforce.
U.S. Department of State:
The Department of State advises the President on foreign policy and
relations. Accordingly, PDD 63 assigned State as the lead for the
special function of foreign affairs, and Executive Order 13231 assigned
the Secretary of State or his designee to the President‘s Critical
Infrastructure Protection Board, on which State serves as chair of the
International Affairs Committee. According to agency officials and
federal documents, the organizations with critical infrastructure
protection responsibilities are as follows:
* the Bureau of Resource Management (RM),
* the Bureau of Diplomatic Security (DS),
* the Bureau of Political-Military Affairs (PM),
* the Bureau of International Narcotics and Law Enforcement (INL), and:
* the Bureau of Economic and Business Affairs (EB).
Bureau of Resource Management:
The Assistant Secretary for Resource Management is responsible for
managing the formal department-wide CIP program plan by serving as
chair of the Department‘s Critical Infrastructure Protection Governance
Board. The Governance Board facilitates the decision making process on
policy and priorities relating to CIP within the Department. In
addition, the Resource Management Bureau is responsible for ensuring
that the formal departmentwide CIP program is managed and fully
resourced over a multiyear planning period to achieve the CIP
objectives of PDD 63 for both domestic and overseas operations.
Bureau of Diplomatic Security:
The Assistant Secretary for Diplomatic Security is the Department‘s
Chief Infrastructure Assurance Officer, who oversees the protection of
all other aspects of the department‘s critical infrastructure. The
Bureau of Diplomatic Security provides a secure environment for
conducting American diplomacy and promoting American interest
worldwide. Regarding CIP, this bureau develops and maintains effective
security programs for every U.S. embassy and consulate abroad. In
addition, the bureau monitors and analyzes intelligence on terrorist
activities and threats directed against Americans and U.S. diplomatic
facilities overseas, as well as threats against U.S. officials,
visiting foreign dignitaries, resident foreign diplomats, and foreign
missions in the United States.
Bureau of Political-Military Affairs:
The PM Bureau provides policy direction in the areas of international
security, military coordination and peace operations, and arms trade.
Its responsibilities include developing regional security policy,
security assistance, arms transfers, confidence and security building
measures, humanitarian de-mining programs, CIP, burden sharing, and
complex contingency operations and contingency planning. Regarding
federal CIP efforts, this bureau is responsible for coordinating and
implementing interagency and intradepartmental policy development. To
accomplish this goal, PM leads international cooperation on CIP issues.
In addition, Executive Order 13231 assigned this bureau responsibility
for the international CIP outreach program. PM‘s Assistant Secretary
serves as State‘s alternate representative on the President‘s Critical
Infrastructure Protection Board and chair of the Board‘s International
Affairs Committee.
Bureau of International Narcotics and Law Enforcement:
INL has specific responsibility for CIP-related issues involving
criminal misuse of information technology (e.g., cybercrime). This
bureau also coordinates and funds the response of federal law
enforcement to requests for training and technical assistance from
foreign partners, including assistance in fighting high-technology
crime, an important subset of protecting critical networked systems.
Bureau of Economic and Business Affairs:
The EB bureau is responsible for CIP-related issues in multilateral
economic organizations, such as the Organization for Economic
Cooperation and Development, and the Asia Pacific Economic Cooperation
forum. In such forums, the bureau works to develop internationally
accepted information technology security standards and best practices
and to ensure that government information security regimes include
input from private stockholders.
U.S. Department of the Treasury:
PDD 63 assigned Treasury as the lead sector liaison for banking and
finance. Recently, Executive Order 13231 designated the Secretary of
the Treasury a member of the President‘s Critical Infrastructure
Protection Board and created the Financial and Banking Information
Infrastructure Committee (FBIIC), which is chaired by the Treasury
Assistant Secretary for Financial Institutions. In addition, Executive
Order 13228 includes several policy coordinating committees that
regularly seek Treasury‘s input and cooperation. According to agency
officials and federal documents, the organizations with national or
multiagency cyber critical infrastructure protection responsibilities
are as follows:
* the Office of Financial Institutions (OFI),
* the United States Secret Service (USSS),
* the Office of the Comptroller of the Currency (OCC), and:
* the Office of Thrift Supervision (OTS).
Office of Financial Institutions:
Treasury‘s Assistant Secretary for the OFI acts as sector liaison to
the banking and finance sector on CIP. The office coordinates
Treasury‘s efforts regarding legislation and regulation for financial
institutions, federal agencies that regulate or insure financial
institutions, and securities markets. In addition, the assistant
secretary chairs FBIIC, which coordinates the federal financial
regulatory effort to develop a coordinated emergency response mechanism
in order to respond to cyber or physical attacks against the financial
sector. The OFI also participates on standing committees regarding
interdependencies, international outreach, and private-sector
outreach. FBIIC has also been tasked by the Office of Homeland Security
to examine the possible economic consequences of cyber or physical
attacks against these critical assets. Finally, this office is
consulting with private-sector representatives to develop a private-
sector-driven national strategy for infrastructure assurance, which
addresses not only cyberattacks, but also physical attacks against the
financial services sector.
United States Secret Service:
The United States Secret Service‘s role in CIP is to lead the research,
development, and implementation of effective and innovative
investigative programs to combat vulnerabilities of electronic
financial transactions and, as an arm of the Treasury, help sustain a
liaison with the banking and finance organizations to assess and
address vulnerabilities. To meet this challenge, the Secret Service has
permanently assigned representatives to the Critical Infrastructure
Assurance Office, NIPC, the Computer Emergency Response Team
Coordination Center at Carnegie Mellon, the Office of Homeland
Security, and the White House Office of Critical Infrastructure
Protection. The Secret Service provides input into the national CIP
plan through its representatives in these organizations. The Secret
Service has also initiated a nationwide network of Electronic Crimes
Task Forces, as mandated by the USA PATRIOT Act. These task forces,
which will bring law enforcement, academia, and the private sector
together, have been designated to provide a systemic and proactive
approach to preventing cyber-based crimes. Regarding physical CIP, the
Secret Service helps secure national special security events (e.g., the
Olympics).
Office of the Comptroller of the Currency:
OCC helps protect the nation‘s cyber critical infrastructure by
chartering, regulating, and supervising national banks to ensure that
the banking systems are safe and competitive. To accomplish its goals,
OCC approves and denies applications for new national bank charters;
examines national banks and other entities subject to its supervision;
takes supervisory action against banks that do not comply with laws and
regulations; and issues rules, regulations, and supervisory guidance
governing a wide spectrum of bank activities, including those relating
to investments and lending. The office also participates in the efforts
of the FBIIC.
Office of Thrift Supervision:
OTS, a Treasury bureau, is the primary regulator of all federal and
many state-chartered thrift institutions, which include savings banks
and savings and loan associations. Representatives of the OTS are
members of the FBIIC.
[End of section]
Appendix III: Components of Executive Departments or Agencies and Their
Primary Activities Related to Cyber CIP:
Table 4: Executive Department or Agency Components and Their Primary
Activities Related to Cyber CIP:
Organization: Federal Advisory Committees:
Organization: National Infrastructure Advisory Council; Policy
development: [Check];
Analysis& warning: [Empty];
Compliance: [Empty];
Response& recovery: [Empty];
Research & development: [Empty].
Organization: President‘s Council of Advisors on Science and
Technology;
Policy development: [Check];
Analysis& warning: [Empty];
Compliance: [Empty];
Response& recovery: [Empty];
Research &development: [Empty].
Organization: President‘s National Security Telecommunications
Advisory Committee;
Policy development: [Check];
Analysis& warning: [Empty];
Compliance: [Empty];
Response& recovery: [Empty];
Research &development: [Empty].
Organization: President‘s Information Technology Advisory Committee;
Policy development: [Check];
Analysis& warning: [Empty];
Compliance: [Empty];
Response& recovery: [Empty];
Research &development: [Empty].
Organization: National Science and Technology Council;
Policy development: [Check];
Analysis& warning: [Empty];
Compliance: [Empty];
Response& recovery: [Empty];
Research &development: [Empty].
Organization: Executive Office of the President;
Policy development: [Empty];
Analysis& warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Homeland Security;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: National Security Council;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Science and Technology Policy;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Check];
Research & development: [Empty].
Organization: National Economic Council;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Management and Budget;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: President‘s Critical Infrastructure Protection Board;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Chief Information Officers Council;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: National Communications System;
Policy development: [Check];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Check];
Research & development: [Empty].
Organization: Federal Communications Commission;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: U.S. Department of Commerce;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Critical Infrastructure Assurance Office;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: National Institute of Standards and Technology;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Check].
Organization: National Information Assurance Partnership;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Check].
Organization: National Telecommunications and Information
Administration;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: U.S. Department of Defense;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Joint Staff;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of the Assistant Secretary of Defense, Command,
Control, Communications, and Intelligence;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Defense Advanced Research Projects Agency;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Check].
Organization: Defense Threat Reduction Agency;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Check].
Organization: National Security Agency;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Defense Intelligence Agency;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Joint Task Force - Computer Network Operations;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Director of Central Intelligence;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Central Intelligence Agency;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: National Intelligence Council;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: National Foreign Intelligence Board;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: U.S. Department of Energy;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Energy Assurance;
Policy development: [Check];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: National Laboratories; Policy
development: [Empty];
Analysis& warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Check].
Organization: U.S. Department of Justice;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Computer Crime and Intellectual Property Section;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: National Infrastructure Protection Center;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Check];
Response & recovery: [Check];
Research & development: [Check].
Organization: National Counter Intelligence Executive;
Policy development: [Check];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Cyber Crime Division;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: U.S. Department of Transportation;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Intelligence and Security;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Environmental Protection Agency;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Water;
Policy development: [Check];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Check];
Research & development: [Empty].
Organization: Federal Emergency Management; Agency;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of National Preparedness;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: United States Fire Administration;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of the Chief Information Officer and Information
Technology Services Directorate;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: U.S. General Services Administration;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Federal Computer Incident Response Center;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Acquisition Policy; Policy
development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Department of Health and Human Services;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Emergency Preparedness;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Check];
Research & development: [Empty].
Organization: National Science Foundation;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Check].
Organization: U.S. Department of State;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Bureau of Resource Management;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Bureau of Diplomatic Security;
Policy development: [Empty];
Analysis & warning: [Check];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Bureau of Political-Military Affairs;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Bureau of International Narcotics and Law Enforcement;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Bureau of Economic and Business Affairs;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: U.S. Department of the Treasury;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Financial Institutions;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Empty];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: United States Secret Service;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Check].
Organization: Office of the Comptroller of the Currency;
Policy development: [Check];
Analysis & warning: [Empty];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Empty].
Organization: Office of Thrift Supervision;
Policy development: [Empty];
Analysis & warning: [Empty];
Compliance: [Check];
Response & recovery: [Empty];
Research & development: [Empty].
[End of table]
[End of section]
Appendix IV: Comments from the Department of Justice:
U. S. Department of Justice:
Washington, DC 20530:
May 31, 2002:
Joel C. Willemssen:
Managing Director:
Information Technology Issues:
U.S. General Accounting Office:
441 G Street, NW:
Washington, D.C.
Dear Mr. Willemssen:
On May 17, 2002, the General Accounting Office (GAO) provided the
Department of Justice (DOJ) copies of its draft report ’Critical
Infrastructure Protection: Federal Efforts Require a More Coordinated
and Comprehensive Approach for Protecting Information Systems.“ The
draft was reviewed by representatives of the Criminal Division and the
Federal Bureau of Investigation. The DOJ generally concurs with the
report and is providing the enclosed minor comments for your
consideration and understand that they will be incorporated as
appropriate.
I hope the comments will be beneficial in completing the final
document. If you have any questions concerning any of the Department‘s
comments (technical or formal) you may contact me on (202) 514-0469.
Sincerely,
Vickie L. Sloan:
Director, Audit Liaison Office:
Justice Management Division:
Signed by Vickie L. Sloan:
Enclosure:
[End of section]
Appendix V: Comments from the Special Advisor to the President for
Cyberspace Security:
The White House Washington:
June 7, 2002:
Joel C. Willemssen:
Managing Director, Information Technology Issues:
U.S. General Accounting Office:
441 G Street, NW:
Washington, DC 20548:
Dear Mr. Willemssen:
Thank you for providing me an opportunity to review and comment on the
draft GAO report entitled ’Critical Infrastructure Protection: Federal
Efforts Require a more Coordinated and Comprehensive Approach for
Protecting Information Systems“ (GAO-02-474). Coordinating federal
critical infrastructure protection (CIP) efforts is a complex and
crucial endeavor. In October 2001, the Administration issued Executive
Order 13231 creating the President‘s Critical Infrastructure Protection
Board. Composed of senior federal officials, the Board coordinates
cybersecurity efforts including aligning roles and responsibilities of
the federal departments and agencies.
Your report correctly observes that the risk of computer based attacks
is real and growing. However, the coordination of federal efforts is
only a small part of the overall challenge of infrastructure
protection. The majority of the computing power in the U.S., which is
vulnerable to attack or could be comprised and used to launch attacks
against the nation‘s critical infrastructures, is not owned and
operated by the federal government; it is owned and operated by private
companies (large and small), universities, state and local governments
and home users. This presents a unique strategic challenge.
As Chair of the Board, I am coordinating a national strategy on cyber
security. The strategy will address a broad spectrum challenges related
to cyber security including those faced by federal, state and local
governments, as well as, private companies, infrastructure operators
and home users.
Sincerely,
Richard A. Clarke:
Special Advisor to the President for Cyberspace Security Chairman,
President‘s Infrastructure Protection Board:
Signed by Richard A. Clarke:
[End of section]
Appendix VI: Comments from the Office of Science and Technology Policy:
Executive Office Of The President Office Of Science And Technology
Policy:
Washington, D.C. 20502:
June 4, 2002:
Memorandum For Joel C. Willemssen:
Managing Director, Information Technology Issues:
General Accounting Office:
From: Shana Dale V:
Chief Of Staff And General Counsel:
Subject: OSTP Technical Corrections to GAO-02-474:
The following are technical corrections to the General Accounting
Office‘s proposed report entitled, ’Critical Infrastructure
Protection: Federal Efforts Require a More Coordinated and
Comprehensive Approach for Protecting Information Systems.“
1) Section entitled, ’Relationships Among Cyber CIP Organizations Are
Not Consistently Established,“ paragraph 2, delete sentence 4, ’Of the
organizations with research and development functions, none mentioned
the Office of Science and Technology Policy, who was designated the
lead coordinator for research and development in both PDD 63 and
Executive Order 13231.“
Comment: OSTP has exercised its coordination authority for CIP over the
past five years with those organizations that have research and
development (R&D) functions through regular senior level interagency
meetings.
Beginning in March 1998, the National Science and Technology Council
formed a Critical Infrastructure Protection Research and Development
Interagency Working Group (CIP R&D IWG) under the joint oversight of
the Committee on National Security and the Committee on Technology.
This CIP R&D IWG, led by OSTP, was established to develop and to
sustain a coherent roadmap on technologies that, if implemented within
critical national infrastructure sectors, would reduce vulnerabilities
and counter threats that could cause major damage to the security,
economic vitality, and social well-being of the United States. As a
result of PDD-63, the IWG‘s charter was expanded to develop a process
of ongoing R&D planning and appraisal, as well as to provide
appropriate R&D support to the Critical Infrastructure Coordinating
Group and the national coordinator.
On October 16, 2001, Executive Order 13231 established a standing
committee for research and development (CR&D), chaired by OSTP, to
coordinate a program of Federal Government R&D for protection of
information systems for critical infrastructure, including emergency
preparedness communications and the physical assets that support such
systems, and to ensure coordination of government activities in this
field with corporations, universities, federally funded research
centers, and national laboratories.
The CR&D created under Executive Order 13231 consists of a committee of
principals with senior R&D leadership from across departments and
agencies. Supporting the CR&D principals is a working level
subcommittee with representatives designated by principals from each of
the departments and agencies. The committee of principals meets on a
quarterly basis, and the subcommittee meets twice monthly. It is
inaccurate to imply that consultations are not occurring with the
agencies.
2) Appendix II, Executive Office of the President, Office of Science
and Technology Policy, paragraph 2, should be modified as follows:
The Technology Division is responsible for all of OSTP‘s activities in
the areas of national security an emergency-preparedness
telecommunications; the NCS; NSTAC, continuity of government
programs; and infrastructure protection programs; and works closely
with the Science technology division Division on national issues
security issues. The OSTP Assistant Director for Homeland and
National Security fills the post of Senior Director for Research and
Development within the Office of Homeland Security. OSTP has official
responsibilities for protecting the domestic infrastructure deriving
both from statute and executive order. As a result, OSTP coordinates
between the military and nonmilitary sectors within the government,
between the technical and the policy-making communities, and between
the federal government and state and local governments.
3) Appendix III, Components of Executive Departments or Agencies and
their Primary Activities Related to Cyber CIP, Executive Office of the
President, Office of Science and Technology Policy, should include a
check mark in the ’Response and recovery“ field. (Executive Order
12472, Section 2.)
4) Figure 3: Overview of National or Multi-agency Federal Cyber CIP
Organizations, Office of Science and Technology Policy, should include
Response and Recovery coloring in addition to Research and Development.
(Executive Order 12472, Section 2.)
[End of section]
Appendix VII: Comments from the Federal Emergency Management Agency:
Federal Emergency Management Agency:
Washington, D.C. 20472:
June 13, 2002:
Mr. Joel Willemssen:
General Accounting Office:
441 G Street, NW
Washington, DC 20548:
Dear Mr. Willemssen:
FEMA has reviewed General Accounting Office (GAO) Draft Report
entitled, Critical Infrastructure Protection: Federal Efforts Require a
More Coordinated and Comprehensive Approach for Protecting Information
Systems, GSA-02-474, dated July 2002.
We believe the report, as written does not incorporate the FEMA
Critical Infrastructure Protection (CIP) efforts that were approved by
Director Joe Allbaugh and submitted to the White House. The current
document dilutes the accurate reporting of the Agency‘s CIP structure
and mission. Please substitute the enclosed text for the FEMA portion
of your report, page 64.
The report lists and describes the activities of the Office of National
Preparedness; Readiness, Response, and Recovery Directorate; and the
U.S. Fire Administration as the components of FEMA with activities
related to cyber Critical Infrastructure Protection. FEMA‘s Office of
the CIO/Information Technology Services Directorate should be added to
that list. Relevant additions are incorporated in the text of the
enclosure. The following changes are also required:
1. Figure 4, page 21, should be amended to incorporate the following
under ’Federal Emergency Management Agency“: Office of the CIO/
Information Technology Services Directorate.
2. On page 76, Appendix III, ’Components of Executive Departments or
Agencies and their Primary Activities Related to Cyber CIP,“ the table
should be modified under ’Federal Emergency Management Agency“ to
include an entry, ’Information Technology Services Directorate,“ with a
checkmark under Policy Development.
Thank you for the opportunity to review on this report. Our points of
contact are Michael Mosteller, ONP, 202-646-4312, and Steve Schmidt,
Office of Cyber Security. 540-542-3343.
Sincerely,
Michael D. Brown:
Chief Operating Officer/General Counsel:
Signed by Michael D. Brown:
Attachment:
[End of section]
Appendix VIII: Comments from the Department of State:
United States Department of State:
Washington, D.C. 20520:
June 11 2002:
Dear Ms. Westin:
We appreciate the opportunity to review your draft report, ’Critical
Infrastructure Protection: Federal Efforts Require a More Coordinated
and Comprehensive Approach for Protecting Information System,“ GAO-02-
474, GAO Job Code 310141.
The Department‘s comments are enclosed for incorporation, along with
this letter, as an appendix to the GAO final report.
If you have any questions regarding this response, please contact
Hunter Ledbetter, Office of Intelligence Resources and Planning, Bureau
of Resource Management on (202) 647-7231.
Sincerely,
Christopher B. Burnham:
Assistant Secretary and Chief Financial Officer:
Signed by Christopher B. Burnham:
Enclosure:
As stated.
cc: GAO/IT - Mr. Willemssen State/OIG - Mr. Berman State/RM - Mr.
Kaplan:
Ms. Susan S. Westin, Managing Director, International Affairs and
Trade, U.S. General Accounting Office.
GAO Report Revisions:
U.S. Department of State:
The Department of State (DOS) advises the President on foreign policy
and relations. Accordingly, PDD 63 assigned DOS as the lead for the
special function of foreign affairs. Executive Order 13231 assigned the
Secretary of State or his designee to the President‘s CIP Board, on
which State serves as Chair of the International Affairs Committee.
According to DOS documents and officials, there are currently three
bureaus within the DOS charged with institutional CIP protection and
three others focused primarily on international outreach and
coordination involving CIP. These include:
* the Bureau of Resource Management (RM):
* the Bureau of Diplomatic Security (DS):
* the Bureau of Information Management (IRM):
* the Bureau of Political - Military Affairs (PM):
* the Bureau of International Narcotics and Law Enforcement (INL):
* the Bureau of Economic and Business Affairs (EB):
Bureau of Resource Management (RM):
The Assistant Secretary for Resource Management is responsible for
managing the formal Department-wide CIP Program plan by serving as
Chair of the Department‘s Critical Infrastructure Protection Governance
Board. The Governance Board facilitates the decision making process on
policy and priorities relating to CIP within the Department. In
addition, the RM bureau is responsible for ensuring that the formal
Department-wide CIP Program is managed and resource-loaded over a
multi-year planning period to achieve the CIP objectives of PDD-63 for
both domestic and overseas operations.
Bureau of Diplomatic Security (DS):
The Assistant Secretary for Diplomatic Security is the Department‘s
Chief Infrastructure Assurance Officer (CIAO) who oversees the
protection of all other aspects of the Department‘s critical
infrastructure. The DS bureau provides a secure environment for
conducting American diplomacy and promoting American interest
worldwide. Regarding CIP, DS develops and maintains effective security
programs for every U.S. embassy and consulate abroad.
Bureau of Information Resource Management (IRM):
IRM ensures availability of Information Technology systems and
operations, including IT contingency planning, to support the
Department‘s diplomatic, consular, and management operations; it is
also the authority for the Department‘s computer security programs.
Bureau of Political - Military Affairs (PM):
Executive Order 13231 assigned PM responsibility for the international
CIP outreach program. PM‘s Assistant Secretary serves as State‘s
alternate representative on the President‘s CIP Board and Chair of the
Board‘s International Affairs Committee. In this context, PM is
responsible for coordinating and implementing intradepartmental and
interagency policy to promote international cooperation on CIP issues.
Bureau of International Narcotics and Law Enforcement (INL):
The INL bureau has specific responsibility for CIP-related issues
involving criminal misuse of information technology (e.g. cyber-crime).
INL also coordinates and funds the response of federal law enforcement
to requests for training and technical assistance from foreign
partners, including assistance in fighting high tech crime, an
important subset of protecting critical networked systems.
Bureau for Economic and Business Affairs (EB):
The EB bureau is responsible for CIP-related issues in multilateral
economic organizations such as the Organization for Economic
Cooperation and Development (OECD), and the Asia Pacific Economic
Cooperation forum (APEC). In such fora, the EB bureau works to develop
internationally-accepted information technology security standards and
best practices, and to ensure that government information security
regimes include input from private stockholders.
[End of section]
Appendix IX: GAO Contact and Staff Acknowledgments:
GAO Contact:
Dave Powner (303) 572-7316:
Acknowledgments:
Contributors to this report include Sandra Edwards, Michael Gilmore,
Sophia Harrison, Catherine Schweitzer, Jamelyn Smith, and Eric Winter.
[End of section]
Footnotes:
[1] U.S. General Accounting Office, High-Risk Series: Information
Management and Technology, GAO/HR-97-9 (Washington, D.C.: Feb. 1,
1997); High-Risk Series: An Update, GAO/HR-99-1 (Washington, D.C.:
January 1999); High-Risk Series: An Update, GAO-01-263 (Washington,
D.C.: January. 2001).
[2] President‘s Commission on Critical Infrastructure Protection,
Critical Foundations: Protecting America‘s Infrastructures
(Washington, D.C.: October 1997).
[3] The CERT® Coordination Center is a center of Internet security
expertise located at the Software Engineering Institute, a federally
funded research and development center operated by Carnegie Mellon
University.
[4] Executive Order 13231 replaces this council with the National
Infrastructure Advisory Council.
[5] U.S. General Accounting Office, Combating Terrorism: Selected
Challenges and Related Recommendations, GAO-01-822 (Washington, D.C.:
Sept. 20, 2001).
[6] The White House, Defending America‘s Cyberspace: National Plan for
Information Systems Protection: Version 1.0: An Invitation to a
Dialogue (Washington, D.C.: 2000).
[7] U.S. General Accounting Office, Information Security: Opportunities
for Improved OMB Oversight of Agency Practices., GAO/AIMD-96-110
(Washington, D.C.: Sept. 24, 1996).
[8] U.S. General Accounting Office, Information Security: Serious
Weaknesses Place Critical Federal Operations and Assets at Risk, GAO/
AIMD-98-92 (Washington, D.C.: Sept. 23, 1998); Information Security:
Serious and Widespread Weaknesses Persist at Federal Agencies, GAO/
AIMD-00-295 (Washington, D.C.: Sept. 6, 2000); Information Security:
Additional Actions Needed to Fully Implement Reform Legislation, GAO-
02-470T (Washington, D.C.: Mar. 6, 2002).
[9] GAO/HR-97-9, Feb. 1,1997; GAO-01-263, January 2001.
[10] Title X, Subtitle G--Government Information Security Reform, Floyd
D. Spence National Defense Authorization Act for Fiscal Year 2001, P.L.
106-398 (Oct. 30, 2000).
[11] GAO-02-470T, Mar. 6, 2002.
[12] The Department of Commerce‘s CIAO established Project Matrix to
provide a standard methodology for identifying all assets, nodes,
networks, and associated infrastructure dependencies and
interdependencies required for the federal government to fulfill its
national security, economic stability, and critical public health and
safety responsibilities to the American people.
[13] These are the Departments of Commerce, Defense, Energy, Justice,
Transportation, Health and Human Services, State, and Treasury; and the
Environmental Protection Agency, the Federal Emergency Management
Agency, the General Services Administration, and the National Science
Foundation.
[14] Figure 4 displays the five general CIP activities according to a
color-coded legend. Appendix III provides an alternative (table format)
for black and white printing.
[15] U.S. General Accounting Office, Critical Infrastructure
Protection: Significant Challenges in Developing National
Capabilities, GAO-01-323 (Washington, D.C.: Apr. 25, 2001).
[16] GAO/AIMD-98-92, Washington, D.C.: Sept. 23, 1998.
[17] U.S. General Accounting Office, Critical Infrastructure
Protection: Challenges to Building a Comprehensive Strategy for
Information Sharing and Coordination, GAOT/AIMD-00-268 (Washington,
D.C.: July 26, 2000).
[18] GAO-01-822, Washington, D.C.: Sept. 20, 2001.
[19] Securing the Homeland, Strengthening the Nation, February 2002.
[20] OMB collects this information for the Annual Report on Combating
Terrorism as required by P.L. 105-85. By OMB‘s definition, CIP
encompasses the potential threat from equipment failure, human error,
weather and natural disasters, and criminal as well as terrorist
attacks.
[21] Congressional Research Service, Critical Infrastructures:
Background, Policy, and Implementation, Updated February 4, 2002.
[22] These departments or agencies are the Departments of Agriculture,
Education, Housing and Urban Development, Interior, Labor, and Veterans
Affairs, the U.S. Agency for International Development, the National
Aeronautics and Space Administration, and the Nuclear Regulatory
Commission.
[End of section]
GAO‘s Mission:
The General Accounting Office, the investigative arm of Congress,
exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO‘s commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO‘s Web site (www.gao.gov) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as ’Today‘s Reports,“ on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select ’Subscribe to daily E-mail alert for newly
released products“ under the GAO Reports heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. General Accounting Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000
TDD: (202) 512-2537
Fax: (202) 512-6061
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470
Public Affairs:
Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800
U.S. General Accounting Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: